<?xml version="1.0"?>
<Module projectID="1264" moduleID="1444">
	<ModuleName>mod1</ModuleName>
	<AU>C02_M01</AU>
	<Title>Module Introduction</Title>
	<Subtitle>Module Introduction</Subtitle>
	<LinkSet>links</LinkSet>
	<CourseMapSWFPath>../C02_M01/assets/coursemap.swf</CourseMapSWFPath>
	<NavBtns>
        <NavBtn>
			<ID>courseMenuBtn</ID>
			<Label>Course menu</Label>
			<RMAText>Course menu. Select this button to access the course menu.</RMAText>
			<ClickEventName>MainMenuButtonClicked</ClickEventName>
		</NavBtn> 	
		<NavBtn>
			<ID>moduleMapBtn</ID>
			<Label>Lesson Map</Label>
			<RMAText>Lesson Map.  Select this button to access the lesson map.</RMAText>
			<ClickEventName>CourseMapButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>glossaryBtn</ID>
			<Name>Glossary</Name>
			<RMAText>Glossary. Select this button open the glossary.</RMAText> 
			<ClickEventName>GlossaryButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>resourcesBtn</ID>
			<Label>Resources</Label>
			<RMAText>Resources. Select this button open the resources.</RMAText>
			<ClickEventName>ResourcesButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>exitBtn</ID>
			<Label>Exit</Label>
			<RMAText>Exit.  Select this button to exit the course.</RMAText>
			<ClickEventName>ExitButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>replayBtn</ID>
			<Label>Replay</Label>
			<RMAText>Replay. Select this button to replay the current screen.</RMAText>
			<ClickEventName>ReplayButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>pauseBtn</ID>
			<Label>Pause</Label>
			<RMAText>Pause.  Select this button to pause the course.</RMAText>
			<ClickEventName>PauseButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>resumeBtn</ID>
			<Label>Resume</Label>
			<RMAText>Resume. Select this button to resume the course.</RMAText>
			<ClickEventName>ResumeButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn prevBtn="true">
			<ID>previousPgBtn</ID>
			<Name>Previous Page</Name>
			<RMAText>Previous. Select this button to go to the previous screen.</RMAText>
			<ClickEventName>PreviousButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn nextBtn="true">
			<ID>nextPgBtn</ID>
			<Name>Next Page</Name>
			<RMAText>Next. Select this button to go to the next screen.</RMAText>
			<ClickEventName>NextButtonClicked</ClickEventName>
		</NavBtn>
	</NavBtns>
	<Topics>
		<Topic>
			<Title>Introduction</Title>
			<Subtitle/>
			<Pages>
				<Page>
					<Title>Overview</Title>
					<Subtitle/>
					<Filename>disaidscr1_01</Filename>
					<PageNbr>1</PageNbr>
					<ShowText>
						<Txt frameNbr="1">Malicious events on DoD networks increase in number and complexity each year. Network intrusion detection systems, commonly referred to as a NIDS, can detect when malicious actors reach into the network. As Computer Network Defense Infrastructure Support, or CND-IS, personnel, your ability to use intrusion detection tools and understand trends in network penetration techniques maintains the confidentiality, integrity, and availability of DoD information and information systems. In this module, you will learn about leveraging the power of your NIDS by creating and using custom rules to detect advanced intrusions and malicious events. </Txt>
						<Txt frameNbr="1"/>
					</ShowText>
				<Sec508Data><ContentDescription frameNbr="1">Rich Media Text Description, Course: D O D Intrusion Detection System (I D S) Analysis, Part 3, Module 2: DoD Network Intrusion Detection System (NIDS) Custom Rules Module, Lesson 1: Module Introduction, For each screen you will hear a description. The description is cued by an audio tone. Listen to the description, and then select the play audio narration button to continue. Screen 1 of 2. Lesson title: Module Introduction. Topic title: Introduction. Screen title: Overview. Images of a computer network, a cloud labeled Internet, and a wall labeled firewall between them appears on the screen with pulsing lines moving between them representing data flow. Images of a globe and masked men actors with laptops representing malicious appear with pulsing lines of data moving toward the cloud labeled internet. The lines representing malicious activity pass through the cloud and move toward the firewall image. The firewall deflects the lines from the masked men. Image of a computer server labeled NIDS is added to the network. One of the malicious actors sends a line of data through the internet. The malicious activity makes it through the firewall, and the NIDS displays an alert. Image of a worker at a workstation, labeled C N D I S, is added to the network. The malicious actors send another line of malicious activity through the firewall and reach the computer network. The C N D I S screen displays network intrusion.The malicious actors send another line of data representing a malicious activity of a worm file. The worm makes it through the firewall and connects with one of the workstations. The workstation displays an image of toxic infection on the monitor. The monitor of the C N D I S also displays Alert: potential worm outbreak.</ContentDescription></Sec508Data></Page>
				<Page>
					<Title>Objectives and Lessons</Title>
					<Subtitle/>
					<Filename>disaidscr1_02</Filename>
					<PageNbr>2</PageNbr>
					<ShowText>
						<Txt frameNbr="1">When you complete this module, you will be able to identify considerations for writing NIDS rules within a government or military environment. You will be able to write a simple NIDS rule using a defined outcome. You will also be able to write a complex NIDS rule using modifiers for a defined outcome, as well as a complex rule using tag options for a defined outcome. Finally, you will be able to write a NIDS rule using advanced detection capabilities. This module includes six lessons, starting with this Module Introduction. Lesson 2, NIDS Rules Fundamentals, explains the components of a NIDS rule, the main options of a NIDS rule, and reviews examples of the uses of NIDS rules. Lesson 3, NIDS Advanced Rules, introduces more complex rule options to better identify anomalies the NIDS should detect. Lesson 4, Rule Optimization, explains the benefits and drawbacks of rule modifiers and various system logging features. Lesson 5, Detecting Worms and Data Exfiltration, introduces ways to use custom rules to detect these specific network threats. Finally, the Module Conclusion reviews key learning from each lesson. </Txt>
						<Txt frameNbr="1"/>
					</ShowText>
				<Sec508Data><ContentDescription frameNbr="1">Screen 2 of 2. Screen title: Objectives and Lessons. Five learning objectives display in support of audio. Six topics display. The first topic is titled Module Introduction. The second topic is titled NIDS Rules Fundamentals. The third topic is titled NIDS Advanced Rules. The fourth topic is titled Rule Optimization. The fifth topic is titled Detecting Worms and Data Exfiltration. The sixth and final topic is the Module Conclusion. A text box displays and states: References to open source or freeware in this training product are for training purposes only, and should not be considered endorsements of these products. Please check with your command, service or agency for guidance on the use of these products.</ContentDescription></Sec508Data></Page>
			</Pages>
		</Topic>
	</Topics>
</Module>
