Network Security and Intrusion Detection

  1. Introduction to Intrusion Detection and Prevention
    1. Intrusion Concepts
      1. Defining Intrusion
        1. Unauthorized Access
          1. Malicious Activity
            1. Policy Violations
            2. Types of Intrusions
              1. External Intrusions
                1. Internal Intrusions
                  1. Privilege Escalation
                    1. Data Exfiltration
                    2. Attack Lifecycle
                      1. Reconnaissance
                        1. Initial Access
                          1. Persistence
                            1. Privilege Escalation
                              1. Defense Evasion
                                1. Credential Access
                                  1. Discovery
                                    1. Lateral Movement
                                      1. Collection
                                        1. Exfiltration
                                          1. Impact
                                          2. Indicators of Compromise
                                            1. Network Indicators
                                              1. Host Indicators
                                                1. Behavioral Indicators
                                                  1. Temporal Indicators
                                                2. Intrusion Detection Systems Goals
                                                  1. Early Threat Detection
                                                    1. Real-Time Monitoring
                                                      1. Anomaly Identification
                                                        1. Pattern Recognition
                                                        2. Alerting and Notification
                                                          1. Alert Generation
                                                            1. Alert Prioritization
                                                              1. Escalation Procedures
                                                              2. Forensic Support
                                                                1. Evidence Collection
                                                                  1. Timeline Reconstruction
                                                                    1. Attack Attribution
                                                                    2. Compliance Support
                                                                      1. Regulatory Requirements
                                                                        1. Audit Trail Maintenance
                                                                          1. Reporting Capabilities
                                                                        2. Intrusion Prevention Systems Goals
                                                                          1. Automated Threat Blocking
                                                                            1. Real-Time Response
                                                                              1. Policy Enforcement
                                                                                1. Threat Mitigation
                                                                                2. Attack Surface Reduction
                                                                                  1. Vulnerability Mitigation
                                                                                    1. Access Control
                                                                                      1. Traffic Filtering
                                                                                      2. Service Availability Maintenance
                                                                                        1. Performance Optimization
                                                                                          1. Failover Capabilities
                                                                                            1. Load Balancing
                                                                                          2. Key Terminology and Metrics
                                                                                            1. Alert Terminology
                                                                                              1. Security Events
                                                                                                1. Security Incidents
                                                                                                  1. Alert Severity Levels
                                                                                                  2. Detection Accuracy Metrics
                                                                                                    1. True Positive
                                                                                                      1. True Negative
                                                                                                        1. False Positive
                                                                                                          1. False Negative
                                                                                                          2. Performance Metrics
                                                                                                            1. Detection Rate
                                                                                                              1. False Alarm Rate
                                                                                                                1. Precision and Recall
                                                                                                                  1. F-Score
                                                                                                                  2. Operational Metrics
                                                                                                                    1. Mean Time to Detection
                                                                                                                      1. Mean Time to Response
                                                                                                                        1. Alert Volume
                                                                                                                          1. Analyst Efficiency
                                                                                                                        2. IDS vs IPS Comparison
                                                                                                                          1. Deployment Differences
                                                                                                                            1. In-line vs Out-of-band Placement
                                                                                                                              1. Network Topology Considerations
                                                                                                                                1. Performance Impact
                                                                                                                                2. Functional Differences
                                                                                                                                  1. Detection vs Prevention
                                                                                                                                    1. Passive vs Active Response
                                                                                                                                      1. Real-Time vs Near Real-Time
                                                                                                                                      2. Use Case Scenarios
                                                                                                                                        1. When to Use IDS
                                                                                                                                          1. When to Use IPS
                                                                                                                                            1. Hybrid Deployments