Week 2: Monitoring Endpoints with HIDS & Auditd
Jun 17, 2025 · 3 min read · 🔑 Key Topics Covered This week was all about endpoint monitoring — the practice of observing activity on individual systems to detect intrusions, vulnerabilities, or anomalies. In our lecture, we explored: The role of Host Intrusion Detection Syste...
Join discussion
