Introduction
Introduction to advanced intrusion detection
()
1. Intrusion Detection Techniques and Methods
What is intrusion detection?
()
Detection methodology
()
Types of intrusion detection
()
Intrusion detection requirements
()
2. Home Lab Setup
Detection lab overview
()
Lab use cases
()
Tools and technology
()
Documentation
()
Intro to building a security lab
()
VirtualBox installation
()
Set up and provision Security Onion
()
3. Network-Based vs. Host-Based Detection
Network-based vs. host-based
()
IDS and IPS rules
()
Wazuh (HIDS overview)
()
4. Anomaly Detection
Anomaly detection overview
()
Anomaly detection techniques
()
Issues with anomaly detection
()
5. The ATT&CK Matrix and Threat Intel
What is the ATT&CK Matrix?
()
Adversary tactics, techniques, and procedures (TTPs)
()
Leveraging threat intelligence
()
6. Data Management
Data management overview
()
Data collection methods
()
Data mover example
()
Data science and cybersecurity
()
7. Tactical Data
Detection life cycle
()
Data dictionary and data models
()
Crafting detections
()
8. Advanced Detection through Deception Technology
What is cyber deception?
()
Honeypot usage
()