Network Survey & Extraction: Network Monitoring

Networking    |    Intermediate
  • 14 videos | 51m 44s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 12 users Rating 4.4 of 12 users (12)
Developing techniques to scan and monitor networks is a process of discovery. Being able to continuously monitor or schedule regular tests for vulnerabilities is part of the ongoing battle of network security. In this course, you'll learn to test and take inventory of network hosts so you can monitor more effectively. First, you'll examine methods for actively monitoring and collecting data, as well as strategies for reporting and sharing results. You'll then move on to tools to catalog, compare, filter, and test services, so that any anomaly can be picked up in your scanning activities.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize tips and tricks for monitoring services
    Develop data management practices for network data collected from scans
    Identify network vulnerability metrics
    Develop strategies for network reporting and record keeping
    Perform dns host discovery
    Perform requests with netcat and other tools to pull banner information from services
  • Filter connection information from network data using tcpdump
    Filter protocol details from network data using tcpdump
    Collect server and network technology and infrastructure data
    Detect firewall type and version information
    Scan for ssl/tls version and cipher capabilities
    Test for smtp version information and open relay vulnerabilities
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 28s
  • 3m 46s
    After completing this video, you will be able to recognize tips and tricks for monitoring services. FREE ACCESS
  • Locked
    3.  Managing Collected Data
    2m 54s
    In this video, you will learn how to manage data collected from network scans. FREE ACCESS
  • Locked
    4.  Vulnerability Metrics
    3m 9s
    In this video, find out how to identify metrics for network vulnerabilities. FREE ACCESS
  • Locked
    5.  Network Reporting and Record Keeping
    4m 29s
    In this video, you will learn how to develop strategies for network reporting and record keeping. FREE ACCESS
  • Locked
    6.  DNS Host Discovery
    4m 22s
    To find out how to perform DNS host discovery, consult a reliable reference on the subject matter. FREE ACCESS
  • Locked
    7.  Netcat Banner Grabbing
    4m 39s
    During this video, you will learn how to perform requests with netcat and other tools to pull banner information from services. FREE ACCESS
  • Locked
    8.  Tcpdump Connection Filtering
    4m 30s
    During this video, you will learn how to filter connection information from network data using Wireshark. FREE ACCESS
  • Locked
    9.  Tcpdump Protocol Filtering
    6m 54s
    In this video, learn how to filter protocol details from network data using Wireshark. FREE ACCESS
  • Locked
    10.  Gathering Site Reports
    4m 48s
    During this video, you will learn how to collect data on server and network technology and infrastructure. FREE ACCESS
  • Locked
    11.  Firewall Scanning
    2m 50s
    In this video, find out how to detect the type and version information of a firewall. FREE ACCESS
  • Locked
    12.  SSL/TLS Scanning
    2m 54s
    In this video, you will learn how to scan for SSL/TLS version and cipher capabilities. FREE ACCESS
  • Locked
    13.  SMTP Scanning
    4m 1s
    To find out how to test for SMTP version information and open relay vulnerabilities, consult a search engine. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 2s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.3 of 12 users Rating 4.3 of 12 users (12)
Rating 4.4 of 30 users Rating 4.4 of 30 users (30)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 284 users Rating 4.5 of 284 users (284)
Rating 4.5 of 665 users Rating 4.5 of 665 users (665)
Rating 4.8 of 26 users Rating 4.8 of 26 users (26)