Network & Host Analysis: Network Analysis Formats
Networking
| Intermediate
- 14 videos | 59m 37s
- Includes Assessment
- Earns a Badge
A variety of formats and protocols are used to help manage networks. Knowing what you have at your disposal to integrate into your operational duties is essential in defensive CyberOps. In this course, you'll learn the format and tools required to manage, operate, and analyze your networks. You'll start by recognizing the purpose and characteristics of NetFlow and IPFIX network flow protocols. You'll then outline how NetFlow is used to baseline a network. Next, you'll identify the importance of logging, access control, and event queues. You'll examine techniques for tapping network traffic and collecting and forwarding logs. You'll explore SNMP, the PCAP format, and whitelisting. Finally, you'll set up Wireshark to detect potentially harmful events and import and export captured traffic in the PCAP format.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe the function and characteristics of the netflow and ipfix network flow protocolsDescribe how netflow is used to baseline a networkRecognize the importance of audit logs for securityIdentify the goals, capabilities, and types of application-based blocking for network accessOutline techniques used to tap network trafficOutline techniques for collecting and forwarding logs
-
Outline techniques for event queuing and handlingDescribe how snmp is used for network management and monitoringDescribe how pcap is implemented for packet capture and filtering programsOutline the process for whitelisting and blacklisting applicationsUse wireshark to detect an anomalous or potentially dangerous eventImport and export captured traffic in the pcap format using wiresharkSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 26s
-
4m 20sUpon completion of this video, you will be able to describe the function and characteristics of the NetFlow and IPFIX network protocols. FREE ACCESS
-
3m 12sAfter completing this video, you will be able to describe how NetFlow is used to baseline a network. FREE ACCESS
-
5m 42sUpon completion of this video, you will be able to recognize the importance of audit logs for security. FREE ACCESS
-
4m 10sIn this video, you will identify the goals, capabilities, and types of application-based blocking for network access. FREE ACCESS
-
3m 49sDuring this video, you will learn how to outline techniques used to tap network traffic. FREE ACCESS
-
4m 17sIn this video, learn how to outline techniques for collecting and forwarding logs. FREE ACCESS
-
5m 53sFind out how to outline techniques for event queuing and handling. FREE ACCESS
-
4m 22sAfter completing this video, you will be able to describe how SNMP is used for network management and monitoring. FREE ACCESS
-
3m 50sUpon completion of this video, you will be able to describe how PCAP is implemented for packet capture and filtering programs. FREE ACCESS
-
5m 29sIn this video, you will learn how to outline the process for adding and removing applications from a whitelist or blacklist. FREE ACCESS
-
7m 46sIn this video, you will use Wireshark to detect an anomalous or potentially dangerous event. FREE ACCESS
-
4m 6sIn this video, you will learn how to import and export captured traffic in the PCAP format using Wireshark. FREE ACCESS
-
1m 16s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.