In this video, learn about HIDS and HIPS.
- [Instructor] Host-based intrusion detection systems,…or HIDS, and host-based intrusion protection systems,…or HIPS, work similarly to their network-based counterparts,…but instead of being installed as a network device,…they consist of a piece of specialized software…that's installed on your endpoint.…This endpoint could be a server, a desktop…or a laptop computer.…With a host-based intrusion detection system,…it focuses on detecting and logging…any unauthorized changes or attacks against a system.…
With a host-based IPS,…the software attempts to not only identify…and log the possible attack,…but also to block it from occurring.…HIDS and HIPS devices usually work…as signature based detections,…although some anomaly-based detection systems do exist.…These systems are often connected back…to a centralized server or orchestrator,…and it will collect the log files and alerts…from these endpoints to give the network defenders…a better picture of the attacks…that may be occurring across the network.…
Author
Released
8/27/2018- Network and security components
- Security solutions in the architecture
- Securing host devices
- Securing mobile and small form factor devices
- Software vulnerabilities
Skill Level Advanced
Duration
Views
Related Courses
-
CASP+ Cert Prep: 1 Risk Management
with Jason Dion2h 34m Advanced
-
Introduction
-
What you should know1m 25s
-
About the exam1m 48s
-
1. Network and Security Components
-
Network design1m 49s
-
Switches4m 1s
-
Routers1m 41s
-
Proxy2m 3s
-
Firewalls3m 30s
-
Firewall architecture3m 45s
-
Wireless controllers1m 45s
-
Remote access4m 14s
-
Transport encryption3m 28s
-
Mesh networks1m 44s
-
NIDS and NIPS3m 53s
-
SIEM2m 2s
-
Vulnerability scanners2m 1s
-
Database activity monitors2m 11s
-
-
2. Security Solutions in the Architecture
-
ACLs and rule sets2m 18s
-
Change monitoring2m 37s
-
Availability controls5m 22s
-
RAIDS and SANs3m 31s
-
Software-defined networking2m 22s
-
Cloud-managed networks3m 42s
-
Trunking security2m 19s
-
Port security2m 5s
-
Route protection1m 34s
-
DDoS protection2m 45s
-
Security zones4m 2s
-
Network access control2m 43s
-
Network-enabled devices5m 11s
-
Critical infrastructure2m 53s
-
3. Securing Host Devices
-
Securing host devices1m 26s
-
Trusted operating system2m 47s
-
Anti-malware2m 30s
-
Host-based firewall1m 46s
-
HIDS and HIPS59s
-
Data loss prevention2m 16s
-
Log monitoring3m 18s
-
Endpoint detection response1m 18s
-
Patch management2m 12s
-
Baselining configuration1m 36s
-
Group policies2m 23s
-
Command line restrictions1m 48s
-
Restricting peripherals3m 31s
-
Boot loader protections4m 21s
-
Cloud-augmented security2m 50s
-
-
4. Securing Mobile and Small Form Factor Devices
-
BYOD vs. COPE3m 40s
-
Over-the-air updates1m 7s
-
Remote assistance1m 25s
-
Remote access1m 14s
-
Authentication2m 49s
-
Privacy concerns1m 41s
-
Mobile payment1m 58s
-
Tethering1m 33s
-
Wearable technology2m 42s
-
5. Software Vulnerabilities
-
Application specific issues5m 57s
-
Conclusion
-
Next steps2m 17s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: HIDS and HIPS