Duration:
Only 4 days
Study Mode:
Classroom
Next Date:
21/01/2025 (Tuesday)

Overview

On this 4-day GIAC Intrusion Analyst Certification course, you'll develop the competence to configure and monitor detection systems as well as understand, interpret and analyse network traffic and log files.

This course is aimed at professionals responsible for network and host monitoring, traffic analysis and intrusion detection. Some of the skills you'll learn include:

  • Developing a deeper understanding of traffic analysis tools to detect and subsequently respond to intrusions
  • Understanding the importance behind the optimal placement of IDS sensors and how network forensics can help identify intrusions
  • Understanding the intricacies behind detecting intrusions and assisting analysts with the necessary resources

Our unique Lecture | Lab | Review technique will immerse you in course content. Combining both theoretical knowledge with hands-on experience means you'll learn faster and you'll develop the skills necessary to put your new found knowledge to practice as soon as you return to work.

On this course, you'll be prepared for the GIAC Certified Intrusion Analyst (GCIA) exam. This is covered by your Certification Guarantee.

This course is aimed at those responsible for networking and host monitoring, traffic analysis and intrusion detection.

This course provides knowledge equivalent to the SANS SEC503: Intrusion Detection In-Depth.

Benefits

Please Note

  • Examination vouchers not included for GIAC, CREST and CISSP CBK Review
  • On site testing not included for GIAC, CREST or ITIL Managers and Revision Certification Courses

Curriculum

Advanced IDS Concepts

  • Demonstrate an understanding of IDS tuning methods and correlation issues (e.g., snort, bro)

Application Protocols

  • The candidate will demonstrate knowledge, skill, and ability relating to application layer protocol dissection and analysis including HTTP, SMTP, and various Microsoft protocols

Concepts of TCP/IP and the Link Layer

  • The candidate will understand the TCP/IP communications model and link layer operations

DNS

  • The candidate will demonstrate a thorough understanding of how DNS works for both legitimate and malicious purposes

Fragmentation

  • The candidate will demonstrate comprehension of how fragmentation works through theory and packet capture examples, as well as the concepts behind fragmentation-based attacks

IDS Fundamentals and Initial Deployment (e.g., snort, bro)

  • Understand architecture, benefits/weaknesses, and configuration options of common IDS systems. Demonstrate ability to configure and deploy IDS (e.g., snort, bro)

IDS Rules (e.g., snort, bro)

  • Create effective IDS (e.g., snort, bro) rules to detect varied types of malicious activity

IP Headers

  • The candidate will demonstrate the ability to dissect IP packet headers and analyse them for normal and anomalous values that may point to security issues

IPv6

  • The candidate will demonstrate knowledge, skill and ability relating to the analysis of IPv6 as well as issues involving IP6 over IPv4

Network Architecture and Event Correlation

  • The candidate will demonstrate competence with issues relating to IDS/IPS management, network architecture as it pertains to intrusion detection, and event correlation and management

Network Traffic Analysis and Forensics

  • The candidate will demonstrate the ability to analyse real traffic and associated artifacts: malicious, normal and application traffic; and demonstrate the ability to discern malicious traffic from false positives

Packet Engineering

  • The candidate will demonstrate knowledge, skill, and ability relating to packet engineering and manipulation including packet crafting, OS fingerprinting, and IDS Evasion/Insertion

Silk and Other Traffic Analysis Tools

  • The candidate will demonstrate the ability to use Silk and other tools to perform network traffic and flow analysis

TCP

  • The candidate will understand TCP communications as well as expected responses to given stimuli at this layer

Tcpdump Filters

  • The candidate will demonstrate the skill and ability to craft tcpdump filters that match on given criteria

UDP and ICMP

  • The candidate will demonstrated the ability to analyse both UDP and ICMP packets and recognise common issues

Wireshark Fundamentals

  • The candidate will demonstrate the knowledge, skills, and abilities associated with traffic analysis using wireshark from an intermediate to high degree of proficiency

Exam Track

This course will prepare you for the following exam. The exam fee is not included in the course price. If you wish to take the exam, we’ll provide instructions on how to register with GIAC.

  • GIAC Certified Intrusion Analyst (GCIA)

Additional Exam Details:

  • 1 proctored exam
  • 150 questions
  • Time limit of 4 hours
  • Minimum passing score of 67%
  • Certifications must be renewed every 4 years

What's Included

On this accelerated course, you'll get access to the following:

  • Firebrand official training materials

Prerequisites

While there are no official prerequisites for this course, you should have a working knowledge of TCP/IP and hexadecimal. As well as this, you should have an understanding of Linux commands such as cd, sudo and pwd.

Course Dates


Start
Finish
Status
Study Mode
Prices
21/01/2025 (Tue)
24/01/2025 (Fri)
Open
Classroom
21/04/2025 (Mon)
24/04/2025 (Thu)
Open
Classroom
22/07/2025 (Tue)
25/07/2025 (Fri)
Open
Classroom
20/10/2025 (Mon)
23/10/2025 (Thu)
Open
Classroom