Skip to main content

GIAC Intrusion Detection Curriculum

IDS strategies require on-going maintenance to ensure latest attacks will be detected and that the logs are carefully archived for future analysis and reference. As we have seen, we cannot be complacent by solely relying on the automated triggering of alerts or the lack of triggered alerts.

33058 (PDF, 2.25MB)

7 Apr 2009
ByToshi Iijma
Share
All papers are copyrighted

No re-posting of papers is permitted

Subscribe to GIAC’s Monthly Newsletter

Receive expert insights, priority access to certifications, essential updates on regulatory changes and industry developments.