Sophisticated attackers frequently go undetected in a victim’s
network for an extended period. Attackers can blend legitimate traffic
with malicious network activity that only skilled network analysts
know how to detect. This course shows learners how to identify
malicious network activity.
The course provides an overview of network protocols, network
architecture, intrusion detection systems, network traffic capture and
traffic analysis. Learners review the types of network monitoring and
the tools commonly used to analyze captured network traffic. The
course also explores the best techniques for investigating botnets and
how to use honeypots in network monitoring.
- START DATE: December 16th, 2020
- END DATE: December
- TIME: 9:00am - 6:00pm GST, daily
- LOCATION: Dubai, U.A.E.
- Expertise On Demand (EoD) credits will be accepted
After completing this course, learners should be able to:
- Understand the network monitoring and incident response
processes, and why it’s critical in today’s network environments.
Discuss the pros and cons of statistical, connection, full content
and event monitoring and tools
- Perform event-based
monitoring using Snort
- Minimize network traffic with the
Snort rule structure and custom rule creation
- Review Snort
alerts using the Sguil front end
Who Should Attend
Information technology and security staff, corporate investigators
and other staff members who need to understand networks, network
traffic, network traffic analysis and network intrusion investigations.
A basic understanding of TCP/IP and Windows and UNIX platforms.
Familiarity with security terminology and a working knowledge of
Wireshark is also recommended