YoVDO

Getting Started with Cisco Stealthwatch

Offered By: Pluralsight

Tags

Network Security Courses NetFlow Courses Security Operations Center (SOC) Courses

Course Description

Overview

Security teams need a complete understanding of potential security threats, both internal and external, that could disrupt the network. Stealthwatch can monitor networks for potential threats, but before it can, you need to know how to install and configure it.

Attacks on enterprise networks, whether they are a denial of service attacks or malware, have the potential to cause a lot of disruption. Moreover, attacks can come from an internal source in addition to external sources. SOC teams need a tool that will alert them when an attack is in progress and help them pinpoint the attacker and the target. SOC teams need Stealthwatch. In this course, Getting Started with Cisco Stealthwatch, you will not only learn how to install the various Stealthwatch components, but you will also discover how to configure and tune Stealthwatch. First, you will begin by looking at how Stealthwatch looks for threats. Next, you will go through how to install a Stealthwatch Management Console and Flow Collector before learning how to enable NetFlow on IOS-based network devices. Finally, after learning how to tune Stealthwatch, you will look at how to back up and upgrade a Stealthwatch system. When you’re finished with this course, you will have the skills and knowledge of Stealthwatch needed to support a Stealthwatch system on an enterprise network.

Syllabus

  • Course Overview 1min
  • Discovering Cisco Stealthwatch 29mins
  • Installing the SMC and Collector 18mins
  • Installing Netflow on Cisco Devices 26mins
  • Operating Stealthwatch 37mins
  • Troubleshooting and Maintaining Stealthwatch 38mins

Taught by

Martin Brown

Related Courses

Cyber Security Operations and Technology Solutions
Udemy
Palo Alto Networks Security Operations Fundamentals
Palo Alto Networks via Coursera
(Security Operation Centre) SOC Essentials by SOC Experts
Udemy
From SOC to CSIRT
BSidesLV via YouTube
Del Monitoreo al SOC, Digo al Socless - Open Source para el Monitoreo & IR Automático
Ekoparty Security Conference via YouTube