No video
Intrusion Detection and Intrusion Prevention Systems
-------
Zero To Engineer Program: www.zerotoengineer.com
Blog: nexgent.com/blog/
Facebook: / nexgent
LinkedIn: / nexgent
Instagram: / zerotoengineer
Twitter: / nexgent
TikTok: / zerotoengineer
Пікірлер: 49
This is great, the visual example you gave is perfect. I am a noob and starting my journey down this path, and appreciate educational material like this a lot! I liked and subscribed..
I like Gandalf when he say it, I will never forget IPS role like that
simple and straight forward! great job!
I like it your video shoul've been on the top of my search!!
Excellent, simple, creative and fun.
thank you for the simple yet understandable explanation!👍
Very impressive. Good job!
Amazing with your explanation! Great job.
Simple & Nice Explanation...!!
Thank you! very helpful
Thank you brother for ur great explanation
Thanks man, this will be useful for my CSMA exam
Дякую за відео.
Amazing explanation thank you so much
Thank you!
Very informative! thank you so much
Thank you , great job 👏 👏 👏
very explanation thanks
Thanks mate
Thank you.
Good staff!
YOU SHALL NOT PASSSSS
Thanks
You shall not pass is my reminder. Thank you so much for the video😂
:o Awesome content mate
i like it
Nice tutorial. Keep up the good work. YOU SHALL NOT PASS. Very Funny
...... good
Excellent video...
Is it mean that IDS only detect the attack and alert the user while IPS can do both detection and defense also it alert the user
If the NIDS is software where to install it? is it on mgmt terminal? am I correct?
what is the difference between ips and firewall
so many security to keep us safe ^^ and my dumbass still got hacked
But ips should be placed between internet and the firewall
@davelovell8631
2 жыл бұрын
Jibnath, I believe you are mistaken. The firewall should be placed as the first line of defense - it filters packets that, just by their header information, have been deemed undesirable by the network administrator. These can be detected and filtered out quickly. The Intrusion Detection System should then be the second line of defense, coming after the firewall, because it has to perform resource intensive "Deep Packet Inspection". It's better to have it do this on the fewer number of packets that actually get allowed through the firewall, than to have it examine every single packet that comes toward the network, including ones that would just get blocked by the firewall anyways. Otherwise, the IDS might be forced to try to examine too many packets at a time - more than it can successfully investigate, and it would have to let some packets through without inspecting them.
Can anyone clear my doubt
Intro music is very loud!
I am a Targeted Empowered Individual. I am being notoriously cyber-attacked 24/7 by my neighbor. Compromised network and hardware. Any advice greatly appreciated. Have you folks perhaps assisted T.I.s before? Furthermore my comments are being Shadow-banned. Thank you & GOD bless
@haphazardlyhype
2 жыл бұрын
So not trolling here but are you on medication or have you ever been on medication and how long have you been online for maybe it's time for you too disconnect and take a nice long walk.
What happens when there are no normal network activities at all and everything I do is hacked 24/7 almost as if an entire cyber team is coming after me because of a meme I made?? What if their zero days and malware are too new to notice???
@user-id9tf7dh1o
3 ай бұрын
This team could be FBI or even ISIS. Who knows.
@user-id9tf7dh1o
3 ай бұрын
Is my only option to stop being a skid and start learning every second until I master more than them???
very old concept described.
@YoungDen
5 жыл бұрын
Still holds well for anyone studying for the NETWORK+ exam as stated in the video
@samueljackson5182
5 жыл бұрын
Old, but not useless...do you have a better explanation? Or a newer technology?
@illuminated2438
4 жыл бұрын
Very useless comment made
@meseretbeyene917
3 жыл бұрын
show as if u have best way
Thank you!