<Links>
	<Link linkType="CourseMap">
		<DisplayName>Course Introduction</DisplayName>
		<URL>../mod1/module.htm</URL>
		<Name>mod1</Name>
		<TopicNames>
			<Topic firstPageIdx="0">Introduction</Topic>
		</TopicNames>
	</Link>
	<Link linkType="CourseMap">
		<DisplayName>I D S's and the D o D</DisplayName>
		<URL>../mod2/module.htm</URL>
		<Name>mod2</Name>
		<TopicNames>
			<Topic firstPageIdx="0">Course Overview</Topic>
			<Topic firstPageIdx="1">I D S es and the D o D Overview</Topic>
			<Topic firstPageIdx="3">Types of Attacks</Topic>
			<Topic firstPageIdx="8">Conclusion</Topic>
		</TopicNames>
	</Link>
	<Link linkType="CourseMap">
		<DisplayName>Networking Fundamentals</DisplayName>
		<URL>../mod3/module.htm</URL>
		<Name>mod3</Name>
		<TopicNames>
			<Topic firstPageIdx="0">Introduction</Topic>
			<Topic firstPageIdx="1">Networking Basics</Topic>
			<Topic firstPageIdx="17">Ports, Protocols, and Services</Topic>
			<Topic firstPageIdx="24">Identifying IRC Traffic</Topic>
			<Topic firstPageIdx="26">Conclusion</Topic>
		</TopicNames>
	</Link>
	<Link linkType="CourseMap">
		<DisplayName>I D S Overview</DisplayName>
		<URL>../mod4/module.htm</URL>
		<Name>mod4</Name>
		<TopicNames>
			<Topic firstPageIdx="0">Introduction</Topic>
			<Topic firstPageIdx="1">IDS Types and Operations</Topic>			
			<Topic firstPageIdx="6">IDS Events</Topic>
			<Topic firstPageIdx="9">Conclusion</Topic>
		</TopicNames>
	</Link>
	<Link linkType="CourseMap">
		<DisplayName>Implementing I D S's</DisplayName>
		<URL>../mod5/module.htm</URL>
		<Name>mod5</Name>
		<TopicNames>
			<Topic firstPageIdx="0">Introduction</Topic>
			<Topic firstPageIdx="1">DMZs in Networks</Topic>
			<Topic firstPageIdx="6">Network Sniffing Fundamentals</Topic>
			<Topic firstPageIdx="14">IDS Configuration Issues</Topic>
			<Topic firstPageIdx="20">Conclusion</Topic>
		</TopicNames>
	</Link>
	<Link linkType="CourseMap">
		<DisplayName>Advanced Concepts in Incident Detection</DisplayName>
		<URL>../mod6/module.htm</URL>
		<Name>mod6</Name>
		<TopicNames>
			<Topic firstPageIdx="0">Introduction</Topic>
			<Topic firstPageIdx="2">Fragmentation</Topic>
			<Topic firstPageIdx="9">Segmentation</Topic>
			<Topic firstPageIdx="13">Conclusion</Topic>
		</TopicNames>
	</Link>	
	<Link linkType="CourseMap">
		<DisplayName>Course Conclusion</DisplayName>
		<URL>../mod7/module.htm</URL>
		<Name>mod7</Name>
		<TopicNames>
			<Topic firstPageIdx="0">Summary and Conclusion</Topic>
		</TopicNames>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>Snort&#x2122; web site (powered by Sourcefire&#x2122;)</DisplayName>
		<URL>http://www.snort.org/</URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>Security Technical Implementation Guides (STIGS) and Supporting Documents</DisplayName>
		<URL>http://iase.disa.mil/stigs/</URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>Committee on National Security Systems (CNSS) Instruction No. 4009, 26 April 2010, National Information Assurance (IA) Glossary</DisplayName>
		<URL>http://www.cnss.gov/Assets/pdf/cnssi_4009.pdf</URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>Cyberspace Operations Lexicon</DisplayName>
		<URL>../common/cw/data/CyberLexicon.pdf</URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>Nmap web site</DisplayName>
		<URL>http://www.nmap.org</URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
</Links>

