Network & Host Analysis: Network Analysis Formats

Networking
  • 14 Videos | 1h 5m 37s
  • Includes Assessment
  • Earns a Badge
Likes 1 Likes 1
A variety of formats and protocols are used to help manage networks. Knowing what you have at your disposal to integrate into your operational duties is essential in defensive CyberOps. In this course, you'll learn the format and tools required to manage, operate, and analyze your networks. You'll start by recognizing the purpose and characteristics of NetFlow and IPFIX network flow protocols. You'll then outline how NetFlow is used to baseline a network. Next, you'll identify the importance of logging, access control, and event queues. You'll examine techniques for tapping network traffic and collecting and forwarding logs. You'll explore SNMP, the PCAP format, and whitelisting. Finally, you'll set up Wireshark to detect potentially harmful events and import and export captured traffic in the PCAP format.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe the function and characteristics of the NetFlow and IPFIX network flow protocols
    describe how NetFlow is used to baseline a network
    recognize the importance of audit logs for security
    identify the goals, capabilities, and types of application-based blocking for network access
    outline techniques used to tap network traffic
    outline techniques for collecting and forwarding logs
  • outline techniques for event queuing and handling
    describe how SNMP is used for network management and monitoring
    describe how PCAP is implemented for packet capture and filtering programs
    outline the process for whitelisting and blacklisting applications
    use Wireshark to detect an anomalous or potentially dangerous event
    import and export captured traffic in the PCAP format using Wireshark
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 26s
    UP NEXT
  • Playable
    2. 
    NetFlow and IPFIX Collection
    4m 20s
  • Locked
    3. 
    NetFlow and Baselining
    3m 12s
  • Locked
    4. 
    The Benefit of Audit Logs
    5m 42s
  • Locked
    5. 
    Application Access Control
    4m 10s
  • Locked
    6. 
    Tapping Network Traffic
    3m 49s
  • Locked
    7. 
    Emitting and Aggregating Logs
    4m 17s
  • Locked
    8. 
    Queueing Events
    5m 53s
  • Locked
    9. 
    Network Management with SNMP
    4m 22s
  • Locked
    10. 
    Packet Capturing with PCAP
    3m 50s
  • Locked
    11. 
    Whitelisting Applications
    5m 29s
  • Locked
    12. 
    Using Wireshark for Event Detection
    7m 46s
  • Locked
    13. 
    Importing and Exporting PCAP
    4m 6s
  • Locked
    14. 
    Course Summary
    1m 16s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE