Network Monitoring and Analysis
Offered By: Pluralsight
Course Description
Overview
Pluralsight is not an official partner or accredited training center of EC-Council. This course covers network scanning and monitoring techniques to ensure optimal network performance and to identity network security breaches.
Pluralsight is not an official partner or accredited training center of EC-Council. Network scanning is performed by malicious users and IT security professionals. In this course, Network Monitoring and Analysis, you'll learn the fundamental knowledge of common network scans run by attackers so that you can detect this activity. First, you'll explore attack signatures, network monitoring techniques, and OS fingerprinting. Next, you'll learn about common TCP and UDP scan types and how ARP poisoning allows attackers to funnel traffic through their stations. Finally, you'll learn how to use the free, open source, Wireshark network analyzer to capture and analyze network traffic. When you're finished with this course, you will have the skills and knowledge of network monitoring needed to detect and protect against attackers.
Pluralsight is not an official partner or accredited training center of EC-Council. Network scanning is performed by malicious users and IT security professionals. In this course, Network Monitoring and Analysis, you'll learn the fundamental knowledge of common network scans run by attackers so that you can detect this activity. First, you'll explore attack signatures, network monitoring techniques, and OS fingerprinting. Next, you'll learn about common TCP and UDP scan types and how ARP poisoning allows attackers to funnel traffic through their stations. Finally, you'll learn how to use the free, open source, Wireshark network analyzer to capture and analyze network traffic. When you're finished with this course, you will have the skills and knowledge of network monitoring needed to detect and protect against attackers.
Syllabus
- Course Overview 1min
- Monitoring Network Activity 30mins
- Identifying Suspicious Network Activity 22mins
- Monitoring Network Activity Using Wireshark 33mins
Taught by
Daniel Lachance
Related Courses
Analyze Network Traffic with TCPDump: Build a Logging ToolCoursera Project Network via Coursera RESTful API with Rust: Build a Game Map Server
Coursera Project Network via Coursera Distributed File Storage in Go - Full Course
freeCodeCamp Networking and Streams
Frontend Masters Getting Started with Network Load Balancer (NLB) (Japanese)
Amazon Web Services via AWS Skill Builder