YoVDO

Back to the Future

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Log Analysis Courses Intrusion Detection Courses Firewall Management Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of network monitoring and security in this 55-minute conference talk from BSides Knoxville 2015. Delve into the importance of differentiating between various types of logs and understanding what to monitor. Examine flow data, ingress and egress points, and firewall abstractions. Learn about strategic ID placement, traffic analysis, and logging devices. Discover the significance of alerts and security knowledge. Gain insights into Capture The Flag (CTF) exercises, Six Sigma methodologies, and critical thinking skills essential for effective network security. Understand the crucial need for comprehensive knowledge in this field to stay ahead of potential threats and vulnerabilities.

Syllabus

Intro
Not all logs are equal
How do we know we are monitoring
Flow Data
Ingress and Egress
Firewall abstractions
ID placement
Traffic
Logging Devices
Alerts
Security Knowledge
CTF
Six Sigma
Critical Thinking
Need to Understand


Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network