Overview/Purpose

Lets face it, we are constantly challenged to be successful at managing our network and to keep it clean of malware and most of all to prevent malware from ever entering the systems that you manage. Typically, more than one application has to be implemented to allow us to be successful with this endeavor. Likely, one of the most important features that we can enable on our system is a system that prevents an intrusion from happening such as with an Intrusion Prevention System (IPS), that is what his learning plan addresses.


Learning objectives

  • Explore IPS Technologies.
  • Investigate IPS Signatures.
  • Implement IPS.
  • Verify and Monitor IPS.

Target Competencies

  • Implement an Intrusion Prevention System.

Learning Activities

  • Read Chapter 5 – Implementing Intrusion Prevention and Power Point of Chapter 5
  • Participate in Lecture/Class Discussion on firewall technologies
  • Complete Configuration of Chapter 5 Lab A: Configuring an Intrusion Prevention System (IPS) Using the CLI and CCP
  • Complete Packet Tracer Lab.

Assessment Activities

  • Demonstrate and submit Chapter 5 Lab A configurations PAT for evaluation
  • Complete Packet Tracer lab: Configure IOS Intrusion Prevention System (IPS) using CLI