<?xml version="1.0"?>
<Module projectID="1190" moduleID="1205">
	<ModuleName>mod1</ModuleName>
	<AU>mod1</AU>
	<Title>Course Introduction</Title>
	<Subtitle>Course Introduction</Subtitle>
	<LinkSet>NONE</LinkSet>
	<NavBtns>
		<NavBtn>
			<ID>courseMenuBtn</ID>
			<Name>Course menu</Name>
			<ClickEventName>MainMenuButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>glossaryBtn</ID>
			<Name>Glossary</Name>
			<ClickEventName>GlossaryButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>resourcesBtn</ID>
			<Name>Resources</Name>
			<ClickEventName>ResourcesButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>courseMapBtn</ID>
			<Name>Course map</Name>
			<ClickEventName>CourseMapButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>exitBtn</ID>
			<Name>Exit</Name>
			<ClickEventName>ExitButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>replayBtn</ID>
			<Name>Replay</Name>
			<ClickEventName>ReplayButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>pauseBtn</ID>
			<Name>Pause</Name>
			<ClickEventName>PauseButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>resumeBtn</ID>
			<Name>Resume</Name>
			<ClickEventName>ResumeButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn prevBtn="true">
			<ID>previousPgBtn</ID>
			<Name>Previous Page</Name>
			<ClickEventName>PreviousButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn nextBtn="true">
			<ID>nextPgBtn</ID>
			<Name>Next Page</Name>
			<ClickEventName>NextButtonClicked</ClickEventName>
		</NavBtn>
	</NavBtns>
	<Topics>
		<Topic>
			<Title>Introduction</Title>
			<Subtitle></Subtitle>
			<Pages>
				<Page>
					<Title>Purpose</Title>
					<Subtitle></Subtitle>
					<Filename>idsal1_01</Filename>
					<PageNbr>1</PageNbr>
					<ShowText>
						<Txt frameNbr="1">Each year, attacks on the DoD network increase and become more sophisticated, putting DoD information and information systems at great risk. As an IDS analyst or administrator, your skill in using intrusion detection tools and understanding of the trends in network attacks, are critical in maintaining the confidentiality, integrity, and availability of DoD information and information systems. In this course, you will learn about the advanced tools and methods you will use in intrusion detection analysis. </Txt>
						<Txt frameNbr="1"></Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Objectives and Lessons</Title>
					<Subtitle></Subtitle>
					<Filename>idsal1_02</Filename>
					<PageNbr>2</PageNbr>
					<ShowText>
						<Txt frameNbr="1">When you have completed this lesson, you will be able to identify the two basic types of sniffers and some filter constructs. You will be able to explain how to use Wireshark and some simple packet capture and display filters. You will also be able to explain the process to use when analyzing malicious traffic and explain the different variables in client-side attacks. Finally, you will be able to identify what bots and botnets are, and identify their network capabilities and traffic. There are six lessons in this course, starting with this Course Introduction. Lesson two, Sniffers, explains what sniffers are, the two different types of sniffers, and how they each work. Lesson three, Wireshark and the Analysis Process, describes the basic operation of Wireshark and some techniques for configuring a sniffing session and analyzing network traffic. Lesson four, Client-Side Attacks, describes client-side attacks and, how they turn firewalls inside out. Lesson five, Bots and Botnets, explains how bots and botnets operate and how they relate to the client-side attack surface. Finally, the Course Conclusion reviews key points from each lesson and provides an opportunity for you to print a certificate of completion when you are finished. </Txt>
						<Txt frameNbr="1"></Txt>
					</ShowText>
				</Page>
			</Pages>
		</Topic>
	</Topics>
</Module>