Anomaly Detection: Network Anomaly Detection

Security
  • 14 Videos | 1h 17m 43s
  • Includes Assessment
  • Earns a Badge
Likes 15 Likes 15
In this 14-video course, learners can explore best practices for anomaly detection for network forensics with topics such as network behavior anomaly detection (NBAD), frequency analysis, identifying beaconing activity, and recognizing signs of brute force attacks. Also discover protocol and population analysis, HTTPS and SSH (Secure Shell) attacks, as well as triage methods. Begin with a look at concepts and applications of NBAD, then discover how to implement frequency analysis. Learn how to identify beaconing activity, and how to recognize the signs of a brute force attack. Next, learners examine protocol analysis approaches and techniques, and learn about HTTPS attacks, deducing the activity of encrypted web traffic. Analyze SSH authentication behavior; take an overview of population analysis; explore techniques used to reveal hidden connections with behavioral analysis; and learn how to differentiate between different NBAD triage methods. In the final tutorials, discover methods and techniques for performing network anomaly analysis and the benefits of anomaly detection, and examine how network forensics can be used to protect mission critical areas of business.

WHAT YOU WILL LEARN

  • identify the objectives of the course
    recognize concepts and applications of network behavior anomaly detection
    recognize how to implement frequency analysis
    identify beaconing activity
    recognize the signs of a brute force attack
    describe protocol analysis approaches and techniques
    deduce activity of encrypted web traffic
  • analyze SSH authentication behavior
    provide an overview of population analysis
    describe techniques used to reveal hidden connections using behavioral analytics
    differentiate between different NBAD triage methods
    describe methods and techniques for performing network anomaly analysis and the benefits of anomaly detection
    describe how network forensics can be used to protect mission critical areas of business
    summarize the key concepts covered in this course

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 14 Likes 14  
Likes 29 Likes 29  
Likes 26 Likes 26