Learning Guide

Intrusion detection and prevention: IDS/IPS security guide

More on intrusion detection and prevention

Threats expert Nick Lewis explains how to prevent data exfiltration via covert channels

    Requires Free Membership to View

Learn why it may be better to stick with commercial or open source IDS products.

Joel Snyder explains which tools can secure a network perimeter and boost an intrusion defense strategy.

It's no secret that a layered security strategy is the key to protecting enterprise networks from malicious intrusions. And one of the major components in that strategy is having solid intrusion detection and intrusion prevention technology and supporting processes.

This guide is a compilation of SearchSecurity.com's best resources on intrusion detection and prevention. It covers not only the basics of what they are and how they work, but also discusses several other important areas of IDS and IPS security, including IDS/IPS tools, such as Snort, implementation and deployment and wireless intrusion prevention systems (WIPS).

                                                  TABLE OF CONTENTS

Network intrusion detection system basics

Here, security professionals will gain some insight on the basics of network intrusion detection systems by learning how to determine which IDS/IPS technology is right for their enterprises as well as the key differences between the IDS and IPS technologies.

Intrusion detection and prevention tools

Security managers and professionals will learn not only about the features and capabilities of some of the most popular intrusion detection and prevention tools on the market, but also how to use them. 

Intrusion detection and prevention system deployment

Security managers and staff will learn about the features and capabilities of some of the most popular intrusion detection and prevention tools on the market today, as well as how to use them.

Wireless intrusion detection and prevention

Enterprises will learn more about wireless intrusion detection and prevention systems and WLAN security, including how to use a WIPS to monitor wireless traffic and how to set up and manage a WIPS.


This was first published in May 2012

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: