<?xml version="1.0"?>
<Module projectID="1190" moduleID="1205">
	<ModuleName>mod1</ModuleName>
	<AU>mod1</AU>
	<Title>Course Introduction</Title>
	<Subtitle>Course Introduction</Subtitle>
	<LinkSet>links</LinkSet>
	<CourseMapSWFPath>../mod1/assets/coursemap.swf</CourseMapSWFPath>
	<NavBtns>
        <NavBtn>
			<ID>courseMenuBtn</ID>
			<Label>Course menu</Label>
			<RMAText>Course menu. Select this button to access the course menu.</RMAText>
			<ClickEventName>MainMenuButtonClicked</ClickEventName>
		</NavBtn> 	
		<NavBtn>
			<ID>moduleMapBtn</ID>
			<Label>Lesson Map</Label>
			<RMAText>Lesson Map.  Select this button to access the lesson map.</RMAText>
			<ClickEventName>CourseMapButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>glossaryBtn</ID>
			<Name>Glossary</Name>
			<RMAText>Glossary. Select this button open the glossary.</RMAText> 
			<ClickEventName>GlossaryButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>resourcesBtn</ID>
			<Label>Resources</Label>
			<RMAText>Resources. Select this button open the resources.</RMAText>
			<ClickEventName>ResourcesButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>exitBtn</ID>
			<Label>Exit</Label>
			<RMAText>Exit.  Select this button to exit the course.</RMAText>
			<ClickEventName>ExitButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>replayBtn</ID>
			<Label>Replay</Label>
			<RMAText>Replay. Select this button to replay the current screen.</RMAText>
			<ClickEventName>ReplayButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>pauseBtn</ID>
			<Label>Pause</Label>
			<RMAText>Pause.  Select this button to pause the course.</RMAText>
			<ClickEventName>PauseButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>resumeBtn</ID>
			<Label>Resume</Label>
			<RMAText>Resume. Select this button to resume the course.</RMAText>
			<ClickEventName>ResumeButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn prevBtn="true">
			<ID>previousPgBtn</ID>
			<Name>Previous Page</Name>
			<RMAText>Previous. Select this button to go to the previous screen.</RMAText>
			<ClickEventName>PreviousButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn nextBtn="true">
			<ID>nextPgBtn</ID>
			<Name>Next Page</Name>
			<RMAText>Next. Select this button to go to the next screen.</RMAText>
			<ClickEventName>NextButtonClicked</ClickEventName>
		</NavBtn>
	</NavBtns>
	<Topics>
		<Topic>
			<Title>Introduction</Title>
			<Subtitle/>
			<Pages>
				<Page>
					<Title>Purpose</Title>
					<Subtitle/>
					<Filename>idsal1_01</Filename>
					<PageNbr>1</PageNbr>
					<ShowText>
						<Txt frameNbr="1">Each year, attacks on the DoD network increase and become more sophisticated, putting DoD information and information systems at great risk. As an IDS analyst or administrator, your skill in using intrusion detection tools and understanding of the trends in network attacks, are critical in maintaining the confidentiality, integrity, and availability of DoD information and information systems. In this course, you will learn about the advanced tools and methods you will use in intrusion detection analysis. </Txt>
						<Txt frameNbr="1"/>
					</ShowText>
					
				<Sec508Data><ContentDescription frameNbr="1">For each screen you will hear a description. The description is cued by an audio tone. Listen to the description, and then select the play audio narration button to continue. Screen 1 of 11. Lesson title: Course Introduction. Topic title: Introduction. Screen title: Purpose. Image of a masked men with laptops appear with pulsing lines moving toward a cloud labeled The Internet. The lines representing malicious activity pass through the cloud and move toward a screen labeled Firewall. Behind the firewall is a computer network. Some of the malicious activity makes it through the firewall and some activity is stopped at the firewall. Some of the malicious activity reaches the computer network and red rings display around the network indicating it was compromised. Pulsing lines move away from the network back to the masked men. A net representing an intrusion detection system appears between the cloud and firewall. It blocks the malicious activity from reaching the network.</ContentDescription></Sec508Data></Page>
				<Page>
					<Title>Objectives and Lessons</Title>
					<Subtitle/>
					<Filename>idsal1_02</Filename>
					<PageNbr>2</PageNbr>
					<ShowText>
						<Txt frameNbr="1">When you have completed this course, you will be able to identify the two basic types of sniffers and some filter constructs. You will be able to explain how to use Wireshark and some simple packet capture and display filters. You will also be able to explain the process to use when analyzing malicious traffic and explain the different variables in client-side attacks. Finally, you will be able to identify what bots and botnets are, and identify their network capabilities and traffic. There are six lessons in this course, starting with this Course Introduction. Lesson two, Sniffers, explains what sniffers are, the two different types of sniffers, and how they each work. Lesson three, Wireshark and the Analysis Process, describes the basic operation of Wireshark and some techniques for configuring a sniffing session and analyzing network traffic. Lesson four, Client-Side Attacks, describes client-side attacks and, how they turn firewalls inside out. Lesson five, Bots and Botnets, explains how bots and botnets operate and how they relate to the client-side attack surface. Finally, the Course Conclusion reviews key points from each lesson and provides an opportunity for you to print a certificate of completion when you are finished. </Txt>
						<Txt frameNbr="1"/>
					</ShowText>
					
				<Sec508Data><ContentDescription frameNbr="1">Screen 2 of 2. Screen title: Objectives and Lessons. Five learning objectives display in support of audio. Six topics display. The first topic is titled Course Introduction. The second topic is titled Sniffers. The third topic is titled Wireshark and the Analysis Process. The fourth topic is titled Client Side Attacks. The fifth topic is titled Bots and Botnets. The sixth and final topic is the Course Conclusion. A text box displays and states:  References to open source or freeware in this training product are for training purposes only, and should not be considered endorsements of these products. Please check with your command, service or agency for guidance on the use of these products.</ContentDescription></Sec508Data></Page>
			</Pages>
		</Topic>
	</Topics>
</Module>
