![]() ![]() ![]() After spending the first two days examining what we call "Packets as a Second Language," we add in common application protocols and a general approach to researching and understanding new protocols. Rather than starting with a tool and teaching you how to use that tool in different situations, this course teaches you how and why TCP/IP protocols work the way they do. What sets this course apart from any other training is that we take a bottom-up approach to teaching network intrusion detection and network forensics. If you want to be able to find zero-day activities on your network before disclosure, this is definitely the class for you. It's for people who want to deeply understand what is happening on their network today, and who suspect that there are very serious things happening right now that none of their tools are telling them about. This course isn't for people who are simply looking to understand alerts generated by an out-of-the-box Intrusion Detection System (IDS). While past students describe it as the most difficult class they have ever taken, they also tell us it was the most rewarding. SEC503 is one of the most important courses that you will take in your information security career.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |