Publication date : 06/17/2024

Course : Intrusion detection

how to manage security incidents

Practical course - 4d - 28h00 - Ref. INT
Price : 2520 € E.T.

Intrusion detection

how to manage security incidents



This theoretical and practical training course presents the most advanced attack techniques to date, and shows how to deal with them. Based on attacks carried out on identified targets (Web servers, clients, networks, firewalls, databases, etc.), participants will learn how to trigger the appropriate response (anti-trojan filtering, malformed URL filtering, spam detection and real-time intrusion detection with IDS probes).


INTER
IN-HOUSE
CUSTOM

Practical course in person or remote class
Available in English on request

Ref. INT
  4d - 28h00
2520 € E.T.




This theoretical and practical training course presents the most advanced attack techniques to date, and shows how to deal with them. Based on attacks carried out on identified targets (Web servers, clients, networks, firewalls, databases, etc.), participants will learn how to trigger the appropriate response (anti-trojan filtering, malformed URL filtering, spam detection and real-time intrusion detection with IDS probes).


Teaching objectives
At the end of the training, the participant will be able to:
Identify and understand analysis and detection techniques
Acquire the knowledge to deploy different intrusion detection tools
Implement intrusion prevention and detection solutions
Managing an intrusion incident
Understanding the legal framework

Intended audience
Security managers and architects. System and network technicians and administrators.

Prerequisites
Good knowledge of TCP/IP networks. Basic knowledge of IT security.

Practical details
Hands-on work
Secure and "normally " protected architectures (multi-DMZ firewalls, secure applications) will be the target of attacks.

Course schedule

1
The world of IT security

  • Definitions "official": hacker, hacking.
  • The world's hacker community, the "gurus", the "script kiddies".
  • The hacker mindset and culture.
  • Conferences and major safety sites.
Hands-on work
Underground navigation. Locate useful information.

2
TCP/IP for firewalls and intrusion detection

  • IP, TCP and UDP from another angle.
  • Focus on ARP and ICMP.
  • Forced routing of IP packets (source routing).
  • IP fragmentation and reassembly rules.
  • The need for serious filtering.
  • Securing your servers: a must.
  • Technology-based countermeasures: from filtering routers to stateful inspection firewalls; from proxies to reverse proxies.
  • Quick overview of solutions and products.
Hands-on work
Viewing and analyzing classic traffic. Use of various sniffers.

3
Understanding attacks on TCP/IP

  • The "Spoofing" IP.
  • Denial-of-service attacks.
  • TCP sequence number prediction.
  • TCP session theft: Hijacking (Hunt, Juggernaut).
  • Attacks on SNMP.
  • TCP Spoofing attack (Mitnick): demystification.
Hands-on work
Injection of packets manufactured on the network. Participants can choose to use graphical tools, Perl, C or dedicated scripts. Hijacking a telnet connection.

4
Intelligence Gathering: the art of camouflage

  • Search for traces: query Whois databases, DNS servers, search engines.
  • Server identification.
  • Understanding the context: analyzing results, determining filtering rules, specific cases.
Hands-on work
Non-intrusive search for information on a potential target (chosen by participants). Use of network scanning tools.

5
Protect your data

  • Password systems "in clear", by challenge, encrypted.
  • An update on Windows authentication.
  • Reminders on SSH and SSL (HTTPS).
  • Sniffing a switched network: ARP poisoning.
  • Attacks on encrypted data : Man in the Middle" on SSH and SSL, Keystoke Analysis" on SSH.
  • Sniffer detection: advanced tools and methods.
  • Password attacks.
Hands-on work
SSH session decryption and theft: "Man in the Middle" attack. Password cracking with LophtCrack (Windows) and John The Ripper (Unix).

6
Detecting trojans and backdoors

  • State of the art of backdoors on Windows and Unix.
  • Setting up backdoors and trojans.
  • Downloading scripts to clients, exploiting browser bugs.
  • Covert Channels": client-server applications using ICMP.
  • Example of communication with distributed denial-of-service agents.
Hands-on work
Analysis of Loki, a client-server using ICMP. Accessing private information with your browser.

7
Defending online services

  • Server takeover: finding and exploiting vulnerabilities.
  • Examples of how to set up "backdoors" and remove traces.
  • How to bypass a firewall (netcat and bounces)?
  • The search for denial of service.
  • Distributed denial of service (DDoS).
  • Buffer overflow attacks.
  • Exploiting vulnerabilities in source code. Similar techniques: "Format String", "Heap Overflow".
  • Vulnerabilities in Web applications.
  • Theft of information from a database.
  • RootKits.
Hands-on work
Exploitation of the bug used by the "Code Red" worm. Obtain a root shell using various types of buffer overflow. Testing a denial of service (Jolt2, Ssping). Use netcat to bypass a firewall. Use [[SQL Injection]] techniques to break Web authentication.

8
How do you manage an incident?

  • Signs of successful IS intrusion.
  • What have the hackers achieved? How far did they get?
  • How do you react to a successful intrusion?
  • Which servers are affected?
  • Find the entry point and fill it.
  • The Unix/Windows toolbox for evidence retrieval.
  • Clean-up and return to production of compromised servers.

9
Conclusion: what legal framework?

  • The right answer to hackers.
  • French hacking law.
  • The role of the State, official bodies.
  • What can we expect from the Office Central de Lutte contre la Criminalité (OCLCTIC)?
  • The search for evidence and perpetrators.
  • And in an international context?
  • Intrusive testing or domesticated hacking?
  • Stay within a legal framework, choose the service provider, be sure of the result.


Customer reviews
3,9 / 5
Customer reviews are based on end-of-course evaluations. The score is calculated from all evaluations within the past year. Only reviews with a textual comment are displayed.
ION N.
07/10/25
4 / 5

It's a new area for me, because I wasn't doing it before. After the course, my knowledge is clearer and I think I'm going to delve even deeper into this area. The trainer is nice and explains things well.
MARC E.
07/10/25
5 / 5

The content, the teaching, the subjects covered and the trainer's approach were all very good.
DAMIEN L.
07/10/25
4 / 5

The training provided was not in line with the programme displayed by Orsys, which was apparently out of dateThe trainer took this into account when adapting his training.



Dates and locations
Select your location or opt for the remote class then choose your date.
Remote class

Last places available
Guaranteed date, in person or remotely
Guaranteed session

REMOTE CLASS
2026 : 21 Apr., 19 May, 29 Sep., 6 Oct., 1 Dec., 8 Dec.

PARIS LA DÉFENSE
2026 : 19 May, 6 Oct., 8 Dec.