Application Analysis with PacketFence
Offered By: Pluralsight
Course Description
Overview
In this course, you will learn to effectively secure networks - from small to very large heterogeneous networks using PacketFence.
Organizations often face challenges in monitoring and securing their network traffic, especially with the proliferation of various application layer protocols that attackers can exploit. In this course, Application Analysis with PacketFence, you’ll learn about the PacketFence tool and its main functions. Next, you’ll apply how to detect and mitigate these techniques: T1071 - Application Layer Protocol, T1071.001 - Web Protocols, T1071.002 - File Transfer Protocols. Finally, you'll delve deeper into real-world scenarios where these techniques are commonly exploited and understand how PacketFence can be a valuable asset in such situations. When you’re finished with this course, you’ll have the skills and knowledge to protect against threats that exploit application layer protocols in an enterprise environment.
Organizations often face challenges in monitoring and securing their network traffic, especially with the proliferation of various application layer protocols that attackers can exploit. In this course, Application Analysis with PacketFence, you’ll learn about the PacketFence tool and its main functions. Next, you’ll apply how to detect and mitigate these techniques: T1071 - Application Layer Protocol, T1071.001 - Web Protocols, T1071.002 - File Transfer Protocols. Finally, you'll delve deeper into real-world scenarios where these techniques are commonly exploited and understand how PacketFence can be a valuable asset in such situations. When you’re finished with this course, you’ll have the skills and knowledge to protect against threats that exploit application layer protocols in an enterprise environment.
Syllabus
- Course Overview 1min
- Detecting Abnormal Network Activities Using PacketFence 14mins
- Resources 1min
Taught by
Pluralsight
Related Courses
Cybersecurity for BusinessUniversity of Colorado System via Coursera Threat and Vulnerability Management for CompTIA CySA+
Pluralsight Security Analyst
Udacity Cisco Core Security: Email Security with Cisco ESA
Pluralsight Cisco Core Security: Security Concepts
Pluralsight