Thank you for this clear explanation.
thank you very much ,great job .
thank you sir !😇😊👍
In your diagram at 2:33 - Is it really necessary to have both a firewall and an IPS? It seems like a lot of their functions overlap. It seems like an IPS is just a more proactive firewall. Am I incorrect to think this? P.S. Thanks for all of your content! Your class notes are so detailed, I am glad I broke down and bought them, my notes were no where near as detailed when I was taking them.
Hello proffesser messer thankyou for your videos they have been super helpful!! I have a question, can I set up a host based VPN on my laptap?
2:56 Then what is the point of having a Firewall? Can't a firewall block those packages?
can both IPS and IDs be in inline mode and passive monitoring? I dont get the diffrence
Thank you for the helpful information. Do you have any recommendations on how to identify false negatives should a malware scan not detect it?
When I deploy ips inline monitoring with enterprise PKI trusted, Can I decrypt the package to deep inspection?
One question. Why one would prefer an IDS over an IPS if the IDS is more risky (i.e., it only alerts you)?
Since an IPS looks at applications is it considered layer 7?
thanks for this, good animations. A couple of questions 1) Darryl Gibson says in his book that CompTIA objectives use the term inline and in-band specifically for IPS, and passive and out-of-band for IDS. This animation shows an IPS in an out-of-band scenario. Would you be able to clarify with CompTIA to confirm what the correct association is? Secondly, another author (Christy, S. Russell, and Easttom, Chuck) who did the test questions had an odd definition of out-of-band which i don't think sounds right at all, they said "an out-of-band network intrusion detection system places the management portion on a different network segment". That is not true according to most definitions i've seen. Like in this video! These are more examples of disagreement between various authors who CompTIA has approved their content. My guess is, nobody at CompTIA bothers proof reading.
Does it prove useful to utilize two or more IPSs to optimize the amount of potential intrusions that will be caught? Or does this have an adverse effect on the transmission of the information across the network that can not be justified in comparison to the potential added level of security?
Is there any legitimate reason to have an IPS sitting out of band?
quick question, could you have both an IPS and IDS? if the IDS is wired in Passive Monitoring and the IPS is wired in Inline Monitoring? Could you set different signatures on the IDS to have it look for different types of Malware, then notify you (since its primary job is to alert)? Or would you just have it all on the IPS?
@HopeBlooms-o8o