Terms you'll need to understand:
Intrusion Detection System (IDS)
Access control list (ACL)
Signature
Atomic signature
Compound signature
Information signature
Attack signature
Signature reactions
Protected network
Queue threshold
Default signature action
Techniques you'll need to master:
Configuring global signature policies
Configuring named signature policies
Disabling signatures
Excluding signatures
Applying named signature policies
Verifying the IDS configuration