Your Complete Guide to Cisco Enterprise IDS Management
This book presents a combination of intrusion detection systems (IDS) and security theory, Cisco security models, and detailed information regarding specific Cisco-based IDS solutions. Cisco Security Professionals Guide to Secure Intrusion Detection Systems also serves as a guide for security administrators studying for the Cisco Secure Intrusion Detection Systems Exam (CSIDS 9E0-100).
Review Intrusion Detection Systems
Find coverage of the basic threats and attack types, as well as an overview of the various types of intrusion detection.
Learn About Cisco Intrusion Detection
Explore the nuts and bolts behind a Cisco-based IDS system, covering both Ciscos "Active Defense" and "Defense in Depth" methodologies.
Install Sensor Appliances
Install the Cisco IDS appliances on your network and learn about password recovery.
Install the Cisco Secure Policy Manager (CSPM)
Review the Cisco IDS management, install CSPM, and learn about the Web-based management tool set that handles the Cisco sensor.
Configure the Sensor Appliance
Configure the sensor appliance, SSH, and event logging. Learn how to restore defaults and update your signature files.
Configure the IDSM Sensor
Explore the installation, configuration, and management of the IDSM sensor when installed in the Cisco 6500 series switch chassis.
Master IDS Signatures and Alarms
Review the use of alarms and Cisco signatures and configure signature parameters.
Configure Cisco Blocking
Protect the network by blocking threats to your network security.
Capture Network Traffic
Configure the switch to provide the mirrored traffic that the IDS sensor needs to watch over the network.
Review Cisco Firewall/IDS IOS
Learn how to configure the IDS signatures and find out the limitations of the IOS-based version of IDS.
Register for Your 1 Year Upgrade
The Syngress Solutions upgrade plan protects you from content obsolescence and provides monthly mailings, whitepapers, and more! Это и многое другое вы найдете в книге Cisco Security Professional's Guide to Secure Intrusion Detection Systems (Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky)