Introduction
                                    
                                        Introduction to advanced intrusion detection
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                1. Intrusion Detection Techniques and Methods
                                    
                                        What is intrusion detection?
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Detection methodology
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Types of intrusion detection
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Intrusion detection requirements
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                2. Home Lab Setup
                                    
                                        Detection lab overview
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Lab use cases
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Tools and technology
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Documentation
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Intro to building a security lab
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        VirtualBox installation
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Set up and provision Security Onion
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                3. Network-Based vs. Host-Based Detection
                                    
                                        Network-based vs. host-based
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        IDS and IPS rules
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Wazuh (HIDS overview)
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                4. Anomaly Detection
                                    
                                        Anomaly detection overview
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Anomaly detection techniques
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Issues with anomaly detection
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                5. The ATT&CK Matrix and Threat Intel
                                    
                                        What is the ATT&CK Matrix?
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Adversary tactics, techniques, and procedures (TTPs)
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Leveraging threat intelligence
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                6. Data Management
                                    
                                        Data management overview
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Data collection methods
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Data mover example
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Data science and cybersecurity
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                7. Tactical Data
                                    
                                        Detection life cycle
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Data dictionary and data models
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Crafting detections
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                8. Advanced Detection through Deception Technology
                                    
                                        What is cyber deception?
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Honeypot usage
                                            
                                                ()