PLU | Network Monitoring And Analysis (2018 EN)

Discussion in 'Information Technology' started by Kanka, Jul 21, 2019.

  1. Kanka

    Kanka Well-Known Member Loyal User

    Messages:
    16,047
    Likes Received:
    449
    Trophy Points:
    83
    [​IMG]

    Company: Pluralsight
    Author: Daniel Lachance
    Full Title: Network Monitoring And Analysis
    Year: 2018
    Language: English
    Genre: Educational: Networking
    Skill Level: Intermediate
    Price: -
    -
    Files: MP4 (+ Slides .PDF)
    Time: 01:27:26
    Video: AVC, 1280 x 720 (1.778) at 15.000 fps, 450 kbps
    Audio: AAC at 83 Kbps, 2 channels, 44.1 KHz



    Pluralsight is not an official partner or accredited training center of EC-Council. This course covers network scanning and monitoring techniques to ensure optimal network performance and to identity network security breaches.

    Pluralsight is not an official partner or accredited training center of EC-Council. Network scanning is performed by malicious users and IT security professionals. In this course, Network Monitoring and Analysis, you'll learn the fundamental knowledge of common network scans run by attackers so that you can detect this activity. First, you'll explore attack signatures, network monitoring techniques, and OS fingerprinting. Next, you'll learn about common TCP and UDP scan types and how ARP poisoning allows attackers to funnel traffic through their stations. Finally, you'll learn how to use the free, open source, Wireshark network analyzer to capture and analyze network traffic. When you're finished with this course, you will have the skills and knowledge of network monitoring needed to detect and protect against attackers.


    Lessons:
    1. Course Overview
    01. Course Overview
    2. Monitoring Network Activity
    02. Module Introduction
    03. Network Monitoring Techniques
    04. Demo: Use PRTG to View Network Information
    05. OS Fingerprinting
    06. Demo: Use nmap to Identify Operating Systems
    07. Attack Signatures
    08. Module Summary
    3. Identifying Suspicious Network Activity
    09. Module Introduction
    10. Reconnaissance Through Network Scanning
    11. Scan Types
    12. Demo: Use the zenman GUI To Conduct A Network Scan
    13. Password Cracking
    14. Demo: Poison ARP Caches Using Kali Linux
    15. Module Summary
    4. Monitoring Network Activity Using Wireshark
    16. Module Introduction
    17. Wireshark Overview
    18. Demo: Navigating the Wireshark UI
    19. Display and Capture Filters
    20. Demo: Enable a Wireshark Capture Filter
    21. Demo: Enable a Wireshark Display Filter
    22. Demo: Analyze Captured Network Traffic Statistics
    23. Module Summary


    -------------