Network Intrusion Detection Training

This training teaches students about detection evaluation, analysis, situation handling, theories in understanding hackers, intelligence gathering, and coordinated attacks.

Course Outline

Through lecture and hands-on exercises, the Network Intrusion Detection training course covers the topic completely. Lessons address detection evaluation, analysis and situation handling. Theories involved in understanding hackers, intelligence gathering and coordinated attacks are also discussed. Finally, students look into an arsenal of preventative and aggressive security measures. 

This training is most ideal for security analysts, as this course will put students in full control of their network’s security. 


Network Intrusion Detection Training

10/05/21 - 10/08/21 (4 days)

8:30AM - 4:30PM EST

Tysons Corner, VA
10/12/21 - 10/15/21 (4 days)

8:30AM - 4:30PM EST

10/12/21 - 10/15/21 (4 days)

8:30AM - 4:30PM EST

Columbia, MD

Not seeing a good fit?

Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.

Contact Us

Learn more about custom training

Course Outline


  • Sensors and Detectors
  • Network Sensors
  • Host and Service Sensors: Logging Traffic at the Source
  • Data Storage for Analysis: Relational Databases, Big Data, Other Options


  • The SiLK Suite
  • Lab 1: Using the SiLK Suite
  • An Introduction to R for Security Analysts
  • Classification and Event Tools: IDS, AV, and SEM
  • Lab 2: Using Event Tools
  • Reference and Lookup
  • Lab 3: Finding out who Someone is
  • More Tools


  • Exploratory Data Analysis and Visualization
  • Lab 4: Data Analysis and Visualization
  • On Fumbling
  • Lab 5: Fumbling
  • Volume and Time Analysis
  • Graph Analysis
  • Application Identification
  • Network Mapping
  • Lab 6: Mapping

Network Intrusion Detection Training FAQs

Who should take this course?

This course is designed for security, systems and intrusion detection analysts; network administrators and engineers; Security managers;
and government and military workers who need to meet IA training requirements.

What is the recommended experience for this course?

Students should have an understanding of TCP/IP, hexadecimal, and
the Linux command-line.

Subscribe now

Get new class alerts, promotions, and blog posts