Network & Host Analysis: Network Analysis Formats

Networking    |    Intermediate
  • 14 videos | 59m 37s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 14 users Rating 4.6 of 14 users (14)
A variety of formats and protocols are used to help manage networks. Knowing what you have at your disposal to integrate into your operational duties is essential in defensive CyberOps. In this course, you'll learn the format and tools required to manage, operate, and analyze your networks. You'll start by recognizing the purpose and characteristics of NetFlow and IPFIX network flow protocols. You'll then outline how NetFlow is used to baseline a network. Next, you'll identify the importance of logging, access control, and event queues. You'll examine techniques for tapping network traffic and collecting and forwarding logs. You'll explore SNMP, the PCAP format, and whitelisting. Finally, you'll set up Wireshark to detect potentially harmful events and import and export captured traffic in the PCAP format.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe the function and characteristics of the netflow and ipfix network flow protocols
    Describe how netflow is used to baseline a network
    Recognize the importance of audit logs for security
    Identify the goals, capabilities, and types of application-based blocking for network access
    Outline techniques used to tap network traffic
    Outline techniques for collecting and forwarding logs
  • Outline techniques for event queuing and handling
    Describe how snmp is used for network management and monitoring
    Describe how pcap is implemented for packet capture and filtering programs
    Outline the process for whitelisting and blacklisting applications
    Use wireshark to detect an anomalous or potentially dangerous event
    Import and export captured traffic in the pcap format using wireshark
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 26s
  • 4m 20s
    Upon completion of this video, you will be able to describe the function and characteristics of the NetFlow and IPFIX network protocols. FREE ACCESS
  • Locked
    3.  NetFlow and Baselining
    3m 12s
    After completing this video, you will be able to describe how NetFlow is used to baseline a network. FREE ACCESS
  • Locked
    4.  The Benefit of Audit Logs
    5m 42s
    Upon completion of this video, you will be able to recognize the importance of audit logs for security. FREE ACCESS
  • Locked
    5.  Application Access Control
    4m 10s
    In this video, you will identify the goals, capabilities, and types of application-based blocking for network access. FREE ACCESS
  • Locked
    6.  Tapping Network Traffic
    3m 49s
    During this video, you will learn how to outline techniques used to tap network traffic. FREE ACCESS
  • Locked
    7.  Emitting and Aggregating Logs
    4m 17s
    In this video, learn how to outline techniques for collecting and forwarding logs. FREE ACCESS
  • Locked
    8.  Queueing Events
    5m 53s
    Find out how to outline techniques for event queuing and handling. FREE ACCESS
  • Locked
    9.  Network Management with SNMP
    4m 22s
    After completing this video, you will be able to describe how SNMP is used for network management and monitoring. FREE ACCESS
  • Locked
    10.  Packet Capturing with PCAP
    3m 50s
    Upon completion of this video, you will be able to describe how PCAP is implemented for packet capture and filtering programs. FREE ACCESS
  • Locked
    11.  Whitelisting Applications
    5m 29s
    In this video, you will learn how to outline the process for adding and removing applications from a whitelist or blacklist. FREE ACCESS
  • Locked
    12.  Using Wireshark for Event Detection
    7m 46s
    In this video, you will use Wireshark to detect an anomalous or potentially dangerous event. FREE ACCESS
  • Locked
    13.  Importing and Exporting PCAP
    4m 6s
    In this video, you will learn how to import and export captured traffic in the PCAP format using Wireshark. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 16s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 48 users Rating 4.6 of 48 users (48)
Rating 4.3 of 22 users Rating 4.3 of 22 users (22)
Rating 4.4 of 58 users Rating 4.4 of 58 users (58)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 1418 users Rating 4.6 of 1418 users (1418)
Rating 4.8 of 17 users Rating 4.8 of 17 users (17)
Rating 4.6 of 27 users Rating 4.6 of 27 users (27)