In this chapter, we covered an overview of an Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS), their similarities and differences, and a deployment model on a network topology. We also looked at different types of IDS/IPS, such as host-based and network-based deployments; how an IDS/IPS detects malicious traffic on a network; and configuring an IPS on a Cisco IOS router.
In the next chapter, we'll dive into application and endpoint security.