Anomaly Detection: Network Anomaly Detection

Security    |    Expert
  • 14 videos | 1h 11m 43s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 20 users Rating 4.7 of 20 users (20)
In this 14-video course, learners can explore best practices for anomaly detection for network forensics with topics such as network behavior anomaly detection (NBAD), frequency analysis, identifying beaconing activity, and recognizing signs of brute force attacks. Also discover protocol and population analysis, HTTPS and SSH (Secure Shell) attacks, as well as triage methods. Begin with a look at concepts and applications of NBAD, then discover how to implement frequency analysis. Learn how to identify beaconing activity, and how to recognize the signs of a brute force attack. Next, learners examine protocol analysis approaches and techniques, and learn about HTTPS attacks, deducing the activity of encrypted web traffic. Analyze SSH authentication behavior; take an overview of population analysis; explore techniques used to reveal hidden connections with behavioral analysis; and learn how to differentiate between different NBAD triage methods. In the final tutorials, discover methods and techniques for performing network anomaly analysis and the benefits of anomaly detection, and examine how network forensics can be used to protect mission critical areas of business.

WHAT YOU WILL LEARN

  • Identify the objectives of the course
    Recognize concepts and applications of network behavior anomaly detection
    Recognize how to implement frequency analysis
    Identify beaconing activity
    Recognize the signs of a brute force attack
    Describe protocol analysis approaches and techniques
    Deduce activity of encrypted web traffic
  • Analyze ssh authentication behavior
    Provide an overview of population analysis
    Describe techniques used to reveal hidden connections using behavioral analytics
    Differentiate between different nbad triage methods
    Describe methods and techniques for performing network anomaly analysis and the benefits of anomaly detection
    Describe how network forensics can be used to protect mission critical areas of business
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 57s
  • 5m 6s
    After completing this video, you will be able to recognize concepts and applications of network behavior anomaly detection. FREE ACCESS
  • Locked
    3.  Frequency Analysis
    5m 3s
    Upon completion of this video, you will be able to recognize how to implement frequency analysis. FREE ACCESS
  • Locked
    4.  Beaconing
    5m 16s
    In this video, find out how to identify beaconing activity. FREE ACCESS
  • Locked
    5.  Brute Force
    6m 21s
    After completing this video, you will be able to recognize the signs of a brute force attack. FREE ACCESS
  • Locked
    6.  Protocol Analysis
    6m 47s
    After completing this video, you will be able to describe protocol analysis approaches and techniques. FREE ACCESS
  • Locked
    7.  HTTPS Attacks
    5m 14s
    During this video, you will learn how to deduce the activity of encrypted web traffic. FREE ACCESS
  • Locked
    8.  SSH Protocol Attacks
    5m 1s
    Find out how to analyze SSH authentication behavior. FREE ACCESS
  • Locked
    9.  Population Analysis
    5m
    After completing this video, you will be able to provide an overview of population analysis. FREE ACCESS
  • Locked
    10.  Hidden Connection Using Behavior Analytics
    5m 46s
    After completing this video, you will be able to describe techniques used to reveal hidden connections using behavioral analytics. FREE ACCESS
  • Locked
    11.  Anomaly Detection Triage Methods
    6m
    Learn how to differentiate between different NBAD triage methods. FREE ACCESS
  • Locked
    12.  Network Anomaly Analysis Techniques
    5m 20s
    After completing this video, you will be able to describe methods and techniques for performing network anomaly analysis and the benefits of anomaly detection. FREE ACCESS
  • Locked
    13.  Mission Critical Areas
    7m 48s
    Upon completion of this video, you will be able to describe how network forensics can be used to protect mission-critical areas of business. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 4s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.5 of 139 users Rating 4.5 of 139 users (139)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.1 of 49 users Rating 4.1 of 49 users (49)
Rating 4.5 of 32 users Rating 4.5 of 32 users (32)
Rating 4.5 of 1527 users Rating 4.5 of 1527 users (1527)