This is great, the visual example you gave is perfect. I am a noob and starting my journey down this path, and appreciate educational material like this a lot! I liked and subscribed..
Jibnath, I believe you are mistaken. The firewall should be placed as the first line of defense - it filters packets that, just by their header information, have been deemed undesirable by the network administrator. These can be detected and filtered out quickly. The Intrusion Detection System should then be the second line of defense, coming after the firewall, because it has to perform resource intensive "Deep Packet Inspection". It's better to have it do this on the fewer number of packets that actually get allowed through the firewall, than to have it examine every single packet that comes toward the network, including ones that would just get blocked by the firewall anyways. Otherwise, the IDS might be forced to try to examine too many packets at a time - more than it can successfully investigate, and it would have to let some packets through without inspecting them.
I am a Targeted Empowered Individual. I am being notoriously cyber-attacked 24/7 by my neighbor. Compromised network and hardware. Any advice greatly appreciated. Have you folks perhaps assisted T.I.s before? Furthermore my comments are being Shadow-banned. Thank you & GOD bless
So not trolling here but are you on medication or have you ever been on medication and how long have you been online for maybe it's time for you too disconnect and take a nice long walk.
What happens when there are no normal network activities at all and everything I do is hacked 24/7 almost as if an entire cyber team is coming after me because of a meme I made?? What if their zero days and malware are too new to notice???
This is great, the visual example you gave is perfect. I am a noob and starting my journey down this path, and appreciate educational material like this a lot! I liked and subscribed..
thank you for the simple yet understandable explanation!👍
simple and straight forward! great job!
I like Gandalf when he say it, I will never forget IPS role like that
Thanks man, this will be useful for my CSMA exam
Excellent, simple, creative and fun.
Simple & Nice Explanation...!!
I like it your video shoul've been on the top of my search!!
Great explanation, thank you!
Amazing with your explanation! Great job.
Very impressive. Good job!
You shall not pass is my reminder. Thank you so much for the video😂
Amazing explanation thank you so much
Very informative! thank you so much
Дякую за відео.
If the NIDS is software where to install it? is it on mgmt terminal? am I correct?
Thank you brother for ur great explanation
Is it mean that IDS only detect the attack and alert the user while IPS can do both detection and defense also it alert the user
Good staff!
YOU SHALL NOT PASSSSS
what is the difference between ips and firewall
Thank you , great job 👏 👏 👏
:o Awesome content mate
Nice tutorial. Keep up the good work. YOU SHALL NOT PASS. Very Funny
Thank you! very helpful
Thanks
very explanation
thanks
You shall not pass 😊 Thank you so much...!
Thank you.
Thank you!
Excellent video...
Thanks mate
so many security to keep us safe ^^ and my dumbass still got hacked
Can anyone clear my doubt
😊😊
But ips should be placed between internet and the firewall
Jibnath, I believe you are mistaken. The firewall should be placed as the first line of defense - it filters packets that, just by their header information, have been deemed undesirable by the network administrator. These can be detected and filtered out quickly. The Intrusion Detection System should then be the second line of defense, coming after the firewall, because it has to perform resource intensive "Deep Packet Inspection". It's better to have it do this on the fewer number of packets that actually get allowed through the firewall, than to have it examine every single packet that comes toward the network, including ones that would just get blocked by the firewall anyways. Otherwise, the IDS might be forced to try to examine too many packets at a time - more than it can successfully investigate, and it would have to let some packets through without inspecting them.
i like it
...... good
Intro music is very loud!
I am a Targeted Empowered Individual. I am being notoriously cyber-attacked 24/7 by my neighbor.
Compromised network and hardware. Any advice greatly appreciated.
Have you folks perhaps assisted T.I.s before?
Furthermore my comments are being Shadow-banned.
Thank you & GOD bless
So not trolling here but are you on medication or have you ever been on medication and how long have you been online for maybe it's time for you too disconnect and take a nice long walk.
What happens when there are no normal network activities at all and everything I do is hacked 24/7 almost as if an entire cyber team is coming after me because of a meme I made?? What if their zero days and malware are too new to notice???
This team could be FBI or even ISIS. Who knows.
Is my only option to stop being a skid and start learning every second until I master more than them???
very old concept described.
Still holds well for anyone studying for the NETWORK+ exam as stated in the video
Old, but not useless...do you have a better explanation? Or a newer technology?
Very useless comment made
show as if u have best way
Thank you!