Network Monitoring and Analysis
Offered By: Pluralsight
Course Description
Overview
Pluralsight is not an official partner or accredited training center of EC-Council. This course covers network scanning and monitoring techniques to ensure optimal network performance and to identity network security breaches.
Pluralsight is not an official partner or accredited training center of EC-Council. Network scanning is performed by malicious users and IT security professionals. In this course, Network Monitoring and Analysis, you'll learn the fundamental knowledge of common network scans run by attackers so that you can detect this activity. First, you'll explore attack signatures, network monitoring techniques, and OS fingerprinting. Next, you'll learn about common TCP and UDP scan types and how ARP poisoning allows attackers to funnel traffic through their stations. Finally, you'll learn how to use the free, open source, Wireshark network analyzer to capture and analyze network traffic. When you're finished with this course, you will have the skills and knowledge of network monitoring needed to detect and protect against attackers.
Pluralsight is not an official partner or accredited training center of EC-Council. Network scanning is performed by malicious users and IT security professionals. In this course, Network Monitoring and Analysis, you'll learn the fundamental knowledge of common network scans run by attackers so that you can detect this activity. First, you'll explore attack signatures, network monitoring techniques, and OS fingerprinting. Next, you'll learn about common TCP and UDP scan types and how ARP poisoning allows attackers to funnel traffic through their stations. Finally, you'll learn how to use the free, open source, Wireshark network analyzer to capture and analyze network traffic. When you're finished with this course, you will have the skills and knowledge of network monitoring needed to detect and protect against attackers.
Syllabus
- Course Overview 1min
- Monitoring Network Activity 30mins
- Identifying Suspicious Network Activity 22mins
- Monitoring Network Activity Using Wireshark 33mins
Taught by
Daniel Lachance
Related Courses
Data Plane ProgrammingKarlstad University via Independent Cyber Security Operations (Cisco CCNA)
The Open University via FutureLearn The Complete Cyber Security Course : Network Security!
Udemy Hacking Academy: How to Monitor & Intercept Transmitted Data
Udemy Networking in Google Cloud: Hybrid Connectivity and Network Management
Pluralsight