Skip to main content
  • Courses
  • Programs
  • Help
    Getting Started Discussion Forums Help Center & FAQ
Saylor Academy
    Close
    Toggle search input
  • Log in or Sign up
Courses
Programs
Help
Getting Started
Discussion Forums
Help Center & FAQ
  • CS406: Information Security (2018.01)
  • Announcements
  • Sections
  • Course Introduction
  • Unit 1: Computer Security Concepts
  • Unit 2: Basic Cryptographic Concepts
  • Unit 3: Public-Key Encryption
  • Unit 4: Access Control Mechanisms
  • Unit 5: Security Solutions
  • Unit 6: Firewalls, Intrusion Detection, and Intrusion Prevention
  • Unit 7: Physical Security
  • Unit 8: Malicious Software and Software Security
  • Unit 9: Security Risk Management
  • Final Exam
  • Resources
  • Activities
  • Forums
  • Quizzes
  • Home
  • My programs

CS406: Information Security (2018.01)

Competencies
  1. Home
  2. Courses
  3. (hidden)
  4. CS406: Information Security (2018.01)
  5. Sections
  6. Unit 6: Firewalls, Intrusion Detection, and Intrusion Prevention

Learn new skills or earn credit towards a degree at your own pace with no deadlines, using free courses from Saylor Academy. We're committed to removing barriers to education and helping you build essential skills to advance your career goals. Start learning here, or check out our full course catalog.

Log in or Sign up to enroll in courses, track your progress, gain access to final exams, and get a free certificate of completion!

Sign up now
Back to course 'CS406: Information Security (2018.01)'
  • Unit 6: Firewalls, Intrusion Detection, and Intrusion Prevention

    In this unit, we will explore the use of security tools such as firewalls and intrusion prevention systems. Following a quick introduction to the concepts of intranet and extranet systems that are frequently used for information exchange by enterprises today, we will look into cryptographic concepts related to securing communication using firewalls. We will explore how firewalls work and will also study different types of intrusion detection systems including host-based and network-based systems.

    Completing this unit should take you approximately 9 hours.

    • Unit 6 Learning Outcomes Page
    • 6.1: Security Protocols and Solutions

      • Indian Institute of Technology, Kharagpur: Indranil Sengupta's "Intranet, Extranet, Firewall" Page

        Watch this video. Following a brief introduction to intranets and extranets used frequently today by businesses, Sengupta explains cryptographic concepts related to securing communication using firewalls.

    • 6.2: Firewall

      • The Open University: "Firewalls - An Overview" Page

        Read this page.

      • Jeff Tyson's "How Firewalls Work” URL

        Read this page.

    • 6.3: Host-Based IDS vs. Network-Based IDS

      • Ricky M. Magalhaes' "Host-Based IDS vs. Network-Based IDS" URL

        Read this article about host-based and network-based intrusion detection systems.

    • 6.4: Network Attacks and Defense

      • University of Cambridge: Ross Anderson's "Network Attack and Defense" URL

        Read this chapter. While you read, try to explain various attacks, the skills that are needed for carrying out these attacks, and how to defend your system against these attacks.

Skip Activities
Activities
  • ForumForums
  • QuizQuizzes
  • Resources
Skip Recent activity
Recent activity
Activity since Tuesday, March 28, 2023, 7:43 PM
Full report of recent activity...

No recent activity

Saylor Academy
  • About

  • Partners

  • Blog

  • Contact

Saylor Academy

© Saylor Academy 2010-2023 except as otherwise noted. Excluding course final exams, content authored by Saylor Academy is available under a Creative Commons Attribution 3.0 Unported license. Third-party materials are the copyright of their respective owners and shared under various licenses. See detailed licensing information.

Saylor Academy®, Saylor.org®, and Harnessing Technology to Make Education Free® are trade names of the Constitution Foundation, a 501(c)(3) organization through which our educational activities are conducted.

"CCBY"

Sitemap | Terms of Use | Privacy Policy

Data retention summary
Get the mobile app
Policies