Take this
course

Software Development / Security & Encryption

Evading IDS

Learn about the different types of vulnerabilities and how to carry out penetration testing so you can put a prevention plan in place.

Description

Intrusion Detection System (IDS) is a device or software that monitors network activities and system activities. While monitoring, it looks for suspicious activities and security policy violations. 


In this Evading IDS course we will be discussing the vulnerabilities in an IS, types of IDS, types of evasion, techniques used to evade IDS, IDS tools, and how to carry out penetration testing so you can put a prevention plan in place. We will combine this with an in-depth demo on how to avoid an IDS. 


Topics Covered Include: 

  • Introduction to IDS
  • Evading IDS
  • Points of Vulnerability in IDS
  • Desynchronization
  • Intrusion Detection Tools
  • IDS Evading Tools
  • Countermeasures 

Take Advantage of our extra downloadable supplemental materials. 

**This .zip file includes PDF versions of our Script, PPT Slides, Quiz Questions, and vocabulary tools to better enhance your understanding for Evading IDS.

Full details

Curriculum

  • Introduction to IDS
    Introduction
    2:10
    Intrusion Detection Systems
    4:22
  • Evading IDS
    Introduction
    0:39
    Encryption and Flooding
    2:00
    Obfuscating
    1:00
    Fragmentation Attack
    1:41
    Overlapping Fragments
    0:58
  • Points of Vulnerability in IDS
    Vulnerabilites
    0:56
    DEMO: How to Avoid IDS
    1:43
    Insertion Attack
    0:53
    Evasion Attack
    0:48
    Denial-of-Service Attack
    2:17
    Application-Layer Attacks
    0:57
    Time to Live Attacks
    1:23
    False Positive Generation
    0:36
    Urgency Flag
    0:52
    Session Splicing
    1:23
  • Desynchronization
    Pre Connection SYN
    1:08
    Post Connection SYN
    1:50
  • Intrusion Detection Tools
    Snort
    0:44
    More Tools
    3:37
    Ways to Detect
    2:57
  • IDS Evading Tools
    ADMutate
    0:35
    Other Evading Tools
    1:41
  • Countermeasures
    Centralized Security Management
    3:28
    IDS Penetration Testing
    2:30
  • Conclusion
    Conclusion
    0:47
    Evading IDS: Supplemental Materials
    Take advantage of all our extra downloadable supplemental materials. This .zip file includes PDF versions of our Script, PPT Slides, Quiz Questions, and vocabulary tools to better enhance your understanding for Evading IDS Chapters 1 - 7.

Skills

  • Information Systems Security
  • IT Security
  • Information Security
  • Certified Ethical Hacker (CEH)
  • CompTIA Security+
  • IT Certification
  • IT Security Certification

Similar Courses

More Courses by this Instructor