Talk With an Expert

GIAC Intrusion Detection Curriculum

GIAC Intrusion Detection Curriculum (PDF, 2.29MB)Published: 07 Apr, 2009
Created by:
Toshi Iijma

IDS strategies require on-going maintenance to ensure latest attacks will be detected and that the logs are carefully archived for future analysis and reference. As we have seen, we cannot be complacent by solely relying on the automated triggering of alerts or the lack of triggered alerts.