Network & Host Analysis: Network Observations

Networking    |    Intermediate
  • 13 videos | 59m 1s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 19 users Rating 4.4 of 19 users (19)
Knowing what goes on over a network requires a high-level picture of it. The ability to conceptualize your network's structure, capabilities, and events is essential to protecting it. In this course, you'll explore the concepts and tools required to identify and visualize your network components. You'll work mostly with the open source network protocol analyzer, Wireshark. You'll start by displaying protocol hierarchies and identifying network endpoints. You'll then describe considerations for visualizing networks and create a network diagram using Visio. Next, you'll outline network security assessment methods, recognize the use of baselines for network management, and carry out baseline activity monitoring. You'll also look at ways of capturing network data. Lastly, you'll explore how Wireshark combines with other tools such as Nmap, SSH, and firewalls.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Display the tree of protocol traffic captured by wireshark
    Identify network endpoints from captured network traffic using wireshark
    Describe considerations when visualizing network nodes
    Create a simple network diagram using visio
    Outline effective approaches to assessing network security
    Recognize the use of various baselines for network management
  • Work with baseline activity monitoring in wireshark
    Describe the different capture engines used in wireshark
    Create firewall rules based on wireshark
    Detect nmap scans using wireshark
    Monitor traffic remotely using wireshark and ssh tunneling
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 22s
  • 6m 9s
    In this video, learn how to display the tree of protocol traffic captured by Wireshark. FREE ACCESS
  • Locked
    3.  Identifying Endpoints Using Wireshark
    5m 11s
    In this video, you will learn how to identify network endpoints from captured network traffic using Wireshark. FREE ACCESS
  • Locked
    4.  Visualizing Networks
    5m 49s
    After completing this video, you will be able to describe considerations for visualizing network nodes. FREE ACCESS
  • Locked
    5.  Visualizing Networks in Visio
    4m 18s
    In this video, you will learn how to create a simple network diagram using Visio. FREE ACCESS
  • Locked
    6.  Assessing Networks
    5m 20s
    In this video, you will outline effective approaches for assessing network security. FREE ACCESS
  • Locked
    7.  Developing Baselines
    4m 8s
    After completing this video, you will be able to recognize the use of various baselines for network management. FREE ACCESS
  • Locked
    8.  Baselining in Wireshark
    7m 38s
    In this video, learn how to work with baseline activity monitoring in Wireshark. FREE ACCESS
  • Locked
    9.  Wireshark Capture Engines
    3m 21s
    Upon completion of this video, you will be able to describe the different capture engines used in Wireshark. FREE ACCESS
  • Locked
    10.  Creating Rules in Wireshark
    3m 52s
    During this video, you will learn how to create firewall rules based on information gathered from Wireshark. FREE ACCESS
  • Locked
    11.  Detecting Scans Using Wireshark
    5m 44s
    In this video, you will learn how to detect Nmap scans using Wireshark. FREE ACCESS
  • Locked
    12.  Tunneling Remotely Using Wireshark
    4m 57s
    During this video, you will learn how to monitor traffic remotely using Wireshark and SSH tunneling. FREE ACCESS
  • Locked
    13.  Course Summary
    1m 13s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.4 of 38 users Rating 4.4 of 38 users (38)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 15 users Rating 4.6 of 15 users (15)
Rating 4.2 of 101 users Rating 4.2 of 101 users (101)