Flow Analysis & Network Hunting Part 1: Intro | |
by Mike McFail & Ben Actis | |
Thumbnail | |
Download | |
Web page | |
Get the class materials to follow along at | |
http://OpenSecurityTraining.info/Flow.html[1] | |
Follow us on Twitter for class news @OpenSecTraining[2]. | |
This course by Mike McFail & Ben Actis focuses on network | |
analysis and hunting of malicious activity from a | |
security operations center perspective. We will dive into | |
the netflow strengths, operational limitations of | |
netflow, recommended sensor placement, netflow tools, | |
visualization of network data, analytic trade craft for | |
network situational awareness and networking hunting | |
scenarios. | |
Course Objectives: | |
* Provide an understanding of the netflow data format | |
* Describe common netflow collection, analysis, and | |
visualization tools | |
* Cover situational awareness and hunting analytic | |
tradecraft | |
* Fuse netflow with other data sources | |
References | |
1. http://OpenSecurityTraining.info/Flow.html (link) | |
2. http://twitter.com/OpenSecTraining (link) | |
Date Published: 2013-07-08 13:12:23 | |
Identifier: FlowAnalysisP1Intro | |
Item Size: 370563387 | |
Media Type: movies | |
# Topics | |
OpenSecurityTraining.info | |
network security | |
netflow | |
flow analysis | |
netflow analysis | |
network hunting | |
intrusion detection | |
IDS | |
YAF | |
Silk | |
iSilk | |
Bro | |
Argus | |
network analysis | |
network sensoring | |
sensoring | |
Computers | |
Computer Security | |
Computer Security Class | |
Computer Security Training | |
Cyber Security | |
Technology | |
Training | |
Education | |
# Collections | |
opensecuritytraining | |
computersandtechvideos | |
# Uploaded by | |
@opensecuritytraining_info | |
# Similar Items | |
View similar items | |
PHAROS | |