Companies Home Search Profile

Network Monitoring and Analysis

Focused View

Daniel Lachance

1:27:26

42 View
  • 1.Course Overview.mp4
    01:03
  • 1.Module Introduction.mp4
    01:02
  • 2.Network Monitoring Techniques.mp4
    05:46
  • 3.Demo - Use PRTG to View Network Information.mp4
    06:18
  • 4.OS Fingerprinting.mp4
    05:37
  • 5.Demo - Use nmap to Identify Operating Systems.mp4
    05:29
  • 6.Attack Signatures.mp4
    04:45
  • 7.Module Summary.mp4
    01:29
  • 1.Module Introduction.mp4
    01:03
  • 2.Reconnaissance Through Network Scanning.mp4
    03:04
  • 3.Scan Types.mp4
    04:27
  • 4.Demo - Use the zenman GUI To Conduct A Network Scan.mp4
    05:09
  • 5.Password Cracking.mp4
    04:40
  • 6.Demo - Poison ARP Caches Using Kali Linux.mp4
    02:55
  • 7.Module Summary.mp4
    01:10
  • 1.Module Introduction.mp4
    01:02
  • 2.Wireshark Overview.mp4
    04:40
  • 3.Demo - Navigating the Wireshark UI.mp4
    07:34
  • 4.Display and Capture Filters.mp4
    04:31
  • 5.Demo - Enable a Wireshark Capture Filter.mp4
    04:48
  • 6.Demo - Enable a Wireshark Display Filter.mp4
    04:48
  • 7.Demo - Analyze Captured Network Traffic Statistics.mp4
    05:02
  • 8.Module Summary.mp4
    01:04
  • Description


    Pluralsight is not an official partner or accredited training center of EC-Council. This course covers network scanning and monitoring techniques to ensure optimal network performance and to identity network security breaches.

    What You'll Learn?


      Pluralsight is not an official partner or accredited training center of EC-Council. Network scanning is performed by malicious users and IT security professionals. In this course, Network Monitoring and Analysis, you'll learn the fundamental knowledge of common network scans run by attackers so that you can detect this activity. First, you'll explore attack signatures, network monitoring techniques, and OS fingerprinting. Next, you'll learn about common TCP and UDP scan types and how ARP poisoning allows attackers to funnel traffic through their stations. Finally, you'll learn how to use the free, open source, Wireshark network analyzer to capture and analyze network traffic. When you're finished with this course, you will have the skills and knowledge of network monitoring needed to detect and protect against attackers.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Daniel Lachance
    Daniel Lachance
    Instructor's Courses
    Daniel Lachance, CompTIA Security+, CompTIA A+®, CompTIA Network+®, CompTIA Server+, CompTIA Cloud Essentials, MCITP, MCTS, MCSA, is the owner of Lachance IT Consulting Inc. He is the author of the CompTIA Server+ Certification All-in-One Exam Guide, CompTIA Cloud Essentials Certification Study Guide, and co-author of CompTIA Security+ Certification Practice Exams. Mr. Lachance is an experienced trainer having delivered IT training in Canada and the Caribbean since the 1990s on topics ranging from various Microsoft products including Visual Basic, Hyper-V and System Center Configuration Manager, as well as other products including UNIX, Linux, Novell and IBM Notes, and Domino. Dan has further experience with Microsoft Azure, Amazon Web Services, Google G Suite, and Linux.
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 23
    • duration 1:27:26
    • level average
    • Release Date 2023/10/20

    Courses related to Ethical Hacking

    Courses related to Penetration Testing

    Courses related to Network Security

    Courses related to Computer Network

    Courses related to Network Engineering

    Courses related to Network Monitoring