Network security refers to measures to protect a computer network from intrusions, attacks, and other malicious activities. These measures generally focus on ensuring the CIA triad: Confidentiality, Integrity, and Availability of data. This presentation dives into the different types of systems used to detect and prevent network intrusions.
This course is a part of IT Audit Bytes series. The other Segments of this series are:
- IT Audit Bytes - Access Control
- IT Audit Bytes - Backup and Recovery
- IT Audit Bytes - Change Management
- IT Audit Bytes - Cybersecurity
- IT Audit Bytes - Data Loss Prevention
- IT Audit Bytes - Disaster Recovery and BCP
- IT Audit Bytes - IT Control Frameworks/li>
- IT Audit Bytes - Job Monitoring
- IT Audit Bytes - Logging and SEIM
- IT Audit Bytes - Network Security and Detection
- IT Audit Bytes - Password Management
- IT Audit Bytes - Physical Security
- IT Audit Bytes - Provisioning and Deprovisioning
- IT Audit Bytes - SDLC Controls
- IT Audit Bytes - Security Awareness Training
- IT Audit Bytes - Separation of Duties Controls
- IT Audit Bytes - SOC Reports
- IT Audit Bytes - Strategy and Governance
- IT Audit Bytes - Third-Party IT Risk Management (TPRM)
Prerequisites
No advanced preparation or prerequisites are required for this course.
Learning Objective
- Explore and contrast Intrusion Detection and Intrusion Prevention Systems.
- Identify and list types of Intrusion Detection Systems.
- Discover and describe best practices in Intrusion Detection and Intrusion Prevention Systems.
Last updated/reviewed: July 19, 2025
(0) Reviews
(0 rating)Lesson Questions and Answers0 Questions
There are no questions.
Answers to Frequently Asked Questions (FAQs)
Ask the instructor a question about this lesson