While preventing unauthorized access to any system if preferable and ideal, the fact remains that sometimes there are vulnerabilities that are successfully exploited by malicious individuals. It becomes, therefore, increasingly important to not only prevent attacks, but to also identify when an attack has taken place, so that the condition can be remedied immediately and proactively. In this module, we look at the relevant techniques related to detecting unauthorized intruders and properly reporting any suspicious activities. At the end of this module, the attendees should be equipped to better detect intrusions, and more effectively protect their systems against attackers.


5 days


All Emerge trainings can be conducted in different locations globally, in customer offices, shared facilities, Emerge-provided training centers, online or through other means, depending on the requirements of the training participants.

Inquire about or sign up to this training »