Network & Host Analysis: Network Operations
Networking
| Intermediate
- 14 videos | 59m 59s
- Includes Assessment
- Earns a Badge
Securely operating a network requires tools to monitor, detect, and prevent breaches. Knowing what goes on and how to stop malicious traffic involves the use of Network Security Monitoring (NSM), security information and event management (SIEM), and intrusion detection and prevention systems (IDS/IPS). In this course, you'll explore these tools and implement Suricata and Kibana as NSM, IDS, IPS, and SIEM solutions. Furthermore, you'll compare and contrast network defense tools. You'll examine NSM and SIEM's purpose and characteristics and outline how to implement and benefit from these techniques. Next, you'll install Suricata and Kibana, and use their features for rule creation, alerts, logging, scripting, and integration. Finally, you'll integrate Suricata and Wireshark to leverage both tools' capabilities so that you can operate your network securely.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseCompare and contrast various network defense toolsRecognize the characteristics of nsm and outline how to implement it as part of a network defense strategyDescribe how siems are used to detect threat activityInstall and configure suricata to be used for network defensive operations, including nsm, ids, and ipsApply a suricata rule and illustrate the action, header, and rule optionsCreate an alert using a suricata rule
-
Configure suricata output in json using the eve output facilityInstall prerequisites for elk stack and suricata from the command lineInstall elk stack in preparation for it to serve as a siem for suricataIntegrate suricata logs with elk stack using filebeat and logstashNavigate elk stack's kibana dashboards for siem use when connected to suricataOutput a pcap log from suricata to be read by wiresharkSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 35s
-
4m 46sIn this video, you will compare and contrast various network defense tools. FREE ACCESS
-
3m 30sAfter completing this video, you will be able to recognize the characteristics of NSM and outline how to implement it as part of a network defense strategy. FREE ACCESS
-
4m 22sUpon completion of this video, you will be able to describe how SIEMs are used to detect and respond to threat activity. FREE ACCESS
-
3m 35sLearn how to install and configure Suricata to be used for network defensive operations, including network security monitoring (NSM), intrusion detection (IDS), and intrusion prevention (IPS). FREE ACCESS
-
6m 25sIn this video, you will apply a Suricata rule and illustrate the action, header, and rule options. FREE ACCESS
-
6m 3sLearn how to create an alert using a Suricata rule. FREE ACCESS
-
5m 23sIn this video, you will configure Suricata output in JSON using the EVE output facility. FREE ACCESS
-
3m 52sFind out how to install prerequisites for ELK Stack and Suricata from the command line. FREE ACCESS
-
4m 31sIn this video, you will install the ELK stack in preparation for it to serve as a SIEM for Suricata. FREE ACCESS
-
4m 38sDuring this video, you will learn how to integrate Suricata logs with the ELK Stack using Filebeat and Logstash. FREE ACCESS
-
6m 28sIn this video, you will learn how to navigate ELK Stack's Kibana dashboards for SIEM use when connected to Suricata. FREE ACCESS
-
3m 32sIn this video, learn how to output a PCAP log from Suricata so that it can be read by Wireshark. FREE ACCESS
-
1m 19s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.