Only 4 days
Classroom
04/02/2025 (Tuesday)
Overview
On this 4-day GIAC Intrusion Analyst Certification course, you'll develop the competence to configure and monitor detection systems as well as understand, interpret and analyse network traffic and log files.
This course is aimed at professionals responsible for network and host monitoring, traffic analysis and intrusion detection. Some of the skills you'll learn include:
- Developing a deeper understanding of traffic analysis tools to detect and subsequently respond to intrusions
- Understanding the importance behind the optimal placement of IDS sensors and how network forensics can help identify intrusions
- Understanding the intricacies behind detecting intrusions and assisting analysts with the necessary resources
Our unique Lecture | Lab | Review technique will immerse you in course content. Combining both theoretical knowledge with hands-on experience means you'll learn faster and you'll develop the skills necessary to put your new found knowledge to practice as soon as you return to work.
On this course, you'll be prepared for the GIAC Certified Intrusion Analyst (GCIA) exam. This is covered by your Certification Guarantee.
This course is aimed at those responsible for networking and host monitoring, traffic analysis and intrusion detection.
This course provides knowledge equivalent to the SANS SEC503: Intrusion Detection In-Depth.
Benefits
Please Note
- Examination vouchers not included for GIAC, CREST and CISSP CBK Review
- On site testing not included for GIAC, CREST or ITIL Managers and Revision Certification Courses
Curriculum
Advanced IDS Concepts
- Demonstrate an understanding of IDS tuning methods and correlation issues (e.g., snort, bro)
Application Protocols
- The candidate will demonstrate knowledge, skill, and ability relating to application layer protocol dissection and analysis including HTTP, SMTP, and various Microsoft protocols
Concepts of TCP/IP and the Link Layer
- The candidate will understand the TCP/IP communications model and link layer operations
DNS
- The candidate will demonstrate a thorough understanding of how DNS works for both legitimate and malicious purposes
Fragmentation
- The candidate will demonstrate comprehension of how fragmentation works through theory and packet capture examples, as well as the concepts behind fragmentation-based attacks
IDS Fundamentals and Initial Deployment (e.g., snort, bro)
- Understand architecture, benefits/weaknesses, and configuration options of common IDS systems. Demonstrate ability to configure and deploy IDS (e.g., snort, bro)
IDS Rules (e.g., snort, bro)
- Create effective IDS (e.g., snort, bro) rules to detect varied types of malicious activity
IP Headers
- The candidate will demonstrate the ability to dissect IP packet headers and analyse them for normal and anomalous values that may point to security issues
IPv6
- The candidate will demonstrate knowledge, skill and ability relating to the analysis of IPv6 as well as issues involving IP6 over IPv4
Network Architecture and Event Correlation
- The candidate will demonstrate competence with issues relating to IDS/IPS management, network architecture as it pertains to intrusion detection, and event correlation and management
Network Traffic Analysis and Forensics
- The candidate will demonstrate the ability to analyse real traffic and associated artifacts: malicious, normal and application traffic; and demonstrate the ability to discern malicious traffic from false positives
Packet Engineering
- The candidate will demonstrate knowledge, skill, and ability relating to packet engineering and manipulation including packet crafting, OS fingerprinting, and IDS Evasion/Insertion
Silk and Other Traffic Analysis Tools
- The candidate will demonstrate the ability to use Silk and other tools to perform network traffic and flow analysis
TCP
- The candidate will understand TCP communications as well as expected responses to given stimuli at this layer
Tcpdump Filters
- The candidate will demonstrate the skill and ability to craft tcpdump filters that match on given criteria
UDP and ICMP
- The candidate will demonstrated the ability to analyse both UDP and ICMP packets and recognise common issues
Wireshark Fundamentals
- The candidate will demonstrate the knowledge, skills, and abilities associated with traffic analysis using wireshark from an intermediate to high degree of proficiency
Exam Track
This course will prepare you for the following exam. The exam fee is not included in the course price. If you wish to take the exam, we’ll provide instructions on how to register with GIAC.
- GIAC Certified Intrusion Analyst (GCIA)
Additional Exam Details:
- 1 proctored exam
- 150 questions
- Time limit of 4 hours
- Minimum passing score of 67%
- Certifications must be renewed every 4 years
What's Included
On this accelerated course, you'll get access to the following:
- Firebrand official training materials
Prerequisites
While there are no official prerequisites for this course, you should have a working knowledge of TCP/IP and hexadecimal. As well as this, you should have an understanding of Linux commands such as cd, sudo and pwd.