1. OVERVIEW OF INFORMATION SECURITY
2. INFORMATION AND NETWORK SECURITY POLICIES
3. CRYPTOGRAPHY AND PKI
4. NETWORK SECURITY APPLICATIONS
5. DESIGN PRINCIPLES
6. COMPLIANCE EVALUATION SYSTEM AND LAW
7. MALICIOUS LOGIC AND ATTACKS
8. VULNERABILITY ANALYSIS AND IT AUDIT
9. INTRUSION DETECTION AND LOG ANALYSIS
LAB WORK -ISA
SOLVED PRACTICE QUESTIONS
Log Based Intrusion Detection System
LOG BASED IDS