Summary

In this chapter, we covered an overview of an Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS), their similarities and differences, and a deployment model on a network topology. We also looked at different types of IDS/IPS, such as host-based and network-based deployments; how an IDS/IPS detects malicious traffic on a network; and configuring an IPS on a Cisco IOS router.

In the next chapter, we'll dive into application and endpoint security.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.15.143.181