User Tools

Site Tools


master

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
master [2023/06/01 15:37] – [Courses offered by SEC] ggankhuyagmaster [2023/06/01 17:06] (current) ggankhuyag
Line 41: Line 41:
 ===2IMS40: Intrusion Detection Laboratory=== ===2IMS40: Intrusion Detection Laboratory===
 The goal of this course is to provide students with a platform to get in-depth, hands-on experience on the building blocks of cyber security monitoring: network-based, host- and log-based intrusion detection. The goal of this course is to provide students with a platform to get in-depth, hands-on experience on the building blocks of cyber security monitoring: network-based, host- and log-based intrusion detection.
-To do so, the course is not focused on front classes but rather adopts a reverse classroom setup: the course will start by providing students with material covering practical and theoretical elements of security monitoring and additional material and pointers covering all three pillars, and their relationship. The students will then form groups and will be able to choose one of the building blocks to explore in depth by developing a fully-fledged laboratory activity for the other students of the course to attend. These laboratory activities will be run and coordinated, in class, by the very students developing them. The development and delivery of these lab sessions in class is also the final examination of the course for the group of students handling it, and it is therefore obligatory.+To do so, the course is not focused on front classes but rather adopts a reverse classroom setup: the course will start by providing students with material covering practical and theoretical elements of security monitoring and additional material and pointers covering all three pillars, and their relationship. The students will then form groups and will be able to choose one of the building blocks to explore in depth by developing a fully-fledged laboratory activity for the other students of the course to attend. These laboratory activities will be run and coordinated, in class, by the very students developing them. The development and delivery of these lab sessions in class is also the final examination of the course for the group of students handling it.
 The outcome of this setup is that all students will have developed, by the end of the course, a profound understanding of a technology of their choice, and at the same time get hands-on experience on a multitude of aspects of intrusion detection, through the lab activities developed by the fellow students. The outcome of this setup is that all students will have developed, by the end of the course, a profound understanding of a technology of their choice, and at the same time get hands-on experience on a multitude of aspects of intrusion detection, through the lab activities developed by the fellow students.
  
  
master.txt · Last modified: 2023/06/01 17:06 by ggankhuyag