CHAPTER 8

Monitoring and Analysis

In this chapter, you will learn about

•  Intrusion detection systems

•  Security alerts and false positives

•  Differences between network-based and host-based intrusion detection systems

•  Differences between intrusion detection systems and intrusion prevention systems

•  Methods of detecting and preventing attacks

•  File integrity checkers

•  Honeypots, honeynets, and padded cells

•  Security event management tools used in large networks

•  Vulnerability assessment test types

•  Vulnerability assessment tools

•  Penetration testing

Operating and Maintaining Monitoring Systems

Monitoring systems within an information technology (IT) network helps to prevent, detect, and correct potential security incidents. ...

Get SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Second Edition, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.