Anomaly Detection: Network Anomaly Detection
Security
| Expert
- 14 videos | 1h 11m 43s
- Includes Assessment
- Earns a Badge
In this 14-video course, learners can explore best practices for anomaly detection for network forensics with topics such as network behavior anomaly detection (NBAD), frequency analysis, identifying beaconing activity, and recognizing signs of brute force attacks. Also discover protocol and population analysis, HTTPS and SSH (Secure Shell) attacks, as well as triage methods. Begin with a look at concepts and applications of NBAD, then discover how to implement frequency analysis. Learn how to identify beaconing activity, and how to recognize the signs of a brute force attack. Next, learners examine protocol analysis approaches and techniques, and learn about HTTPS attacks, deducing the activity of encrypted web traffic. Analyze SSH authentication behavior; take an overview of population analysis; explore techniques used to reveal hidden connections with behavioral analysis; and learn how to differentiate between different NBAD triage methods. In the final tutorials, discover methods and techniques for performing network anomaly analysis and the benefits of anomaly detection, and examine how network forensics can be used to protect mission critical areas of business.
WHAT YOU WILL LEARN
-
Identify the objectives of the courseRecognize concepts and applications of network behavior anomaly detectionRecognize how to implement frequency analysisIdentify beaconing activityRecognize the signs of a brute force attackDescribe protocol analysis approaches and techniquesDeduce activity of encrypted web traffic
-
Analyze ssh authentication behaviorProvide an overview of population analysisDescribe techniques used to reveal hidden connections using behavioral analyticsDifferentiate between different nbad triage methodsDescribe methods and techniques for performing network anomaly analysis and the benefits of anomaly detectionDescribe how network forensics can be used to protect mission critical areas of businessSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 57s
-
5m 6sAfter completing this video, you will be able to recognize concepts and applications of network behavior anomaly detection. FREE ACCESS
-
5m 3sUpon completion of this video, you will be able to recognize how to implement frequency analysis. FREE ACCESS
-
5m 16sIn this video, find out how to identify beaconing activity. FREE ACCESS
-
6m 21sAfter completing this video, you will be able to recognize the signs of a brute force attack. FREE ACCESS
-
6m 47sAfter completing this video, you will be able to describe protocol analysis approaches and techniques. FREE ACCESS
-
5m 14sDuring this video, you will learn how to deduce the activity of encrypted web traffic. FREE ACCESS
-
5m 1sFind out how to analyze SSH authentication behavior. FREE ACCESS
-
5mAfter completing this video, you will be able to provide an overview of population analysis. FREE ACCESS
-
5m 46sAfter completing this video, you will be able to describe techniques used to reveal hidden connections using behavioral analytics. FREE ACCESS
-
6mLearn how to differentiate between different NBAD triage methods. FREE ACCESS
-
5m 20sAfter completing this video, you will be able to describe methods and techniques for performing network anomaly analysis and the benefits of anomaly detection. FREE ACCESS
-
7m 48sUpon completion of this video, you will be able to describe how network forensics can be used to protect mission-critical areas of business. FREE ACCESS
-
1m 4s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.