Companies Home Search Profile

SEC503: Network Monitoring and Threat Detection In-Depth Online Training

Focused View

Erik Choron

21:40:10

11 View
  • 1 Concepts of TCP-IP.mp4
    07:39
  • 2 Part of the Bigger Picture.mp4
    12:43
  • 3 Different parts of TCP-IP.mp4
    06:06
  • 4 Were do we Get These Packets From-.mp4
    10:46
  • 5 Replay the Traffic.mp4
    03:43
  • 6 Learning Binary and Hex.mp4
    06:44
  • 7 Introduction to Wireshark.mp4
    01:08
  • 8 Uses of Wireshark.mp4
    06:41
  • 9 Being Promiscuous .mp4
    10:34
  • 10 Saving our Work for Later.mp4
    09:04
  • 11 Exporting Things From Wireshark.mp4
    12:54
  • 12 Filtering Results.mp4
    08:49
  • 13 UNIX Command Line Processing.mp4
    02:53
  • 14 Why UNIX-.mp4
    10:52
  • 15 Network Analysis on POSIX-based Systems.mp4
    09:08
  • 16 Burpsuite.mp4
    10:23
  • 17 sslstrip.mp4
    08:12
  • 18 Identifying Layer 2.mp4
    07:14
  • 19 Layer 2 Communication.mp4
    12:47
  • 20 Using Layer 2 as a Forwarding Address.mp4
    10:51
  • 21 Where is Layer 2 in our Packet-.mp4
    06:59
  • 22 Packet Examples.mp4
    07:03
  • 23 IP Link Layer 3.mp4
    01:21
  • 24 Identifying Layer 3.mp4
    09:34
  • 25 Layer 3 Communication.mp4
    13:15
  • 26 Using Layer 3 as a Forwarding Address.mp4
    09:14
  • 27 Where is Layer 3 in our Packet-.mp4
    09:20
  • 28 Packet Examples.mp4
    11:25
  • 29 Real-world Application.mp4
    02:45
  • 30 Knowing the Packet.mp4
    10:57
  • 31 Quirks in IP Addressing.mp4
    07:56
  • 32 Layer 3 Protocols.mp4
    10:45
  • 33 Encryption Issues.mp4
    10:58
  • 34 Capturing Those Packets.mp4
    07:16
  • 35 ICMP.mp4
    01:53
  • 36 Identifying ICMP.mp4
    07:26
  • 37 ICMP Communication.mp4
    09:46
  • 38 ICMP Addressing.mp4
    09:24
  • 39 Where is ICMP in our Packet-.mp4
    14:57
  • 40 Packet Examples.mp4
    10:32
  • 41 Identifying UDP.mp4
    06:44
  • 42 UDP Communication.mp4
    09:17
  • 43 UDP Addressing.mp4
    08:23
  • 44 Where is UDP in our Packet-.mp4
    09:31
  • 45 Identifying TCP.mp4
    11:12
  • 46 TCP Communication.mp4
    12:23
  • 47 TCP Addressing.mp4
    10:48
  • 48 Where is TCP in our Packet-.mp4
    09:30
  • 49 Packet Examples.mp4
    08:40
  • 50 IPv6.mp4
    01:16
  • 51 Identifying IPv6.mp4
    08:17
  • 52 IPv6 Communication.mp4
    10:51
  • 53 IPv6 Addressing.mp4
    08:47
  • 54 Where is IPv6 in our Packet-.mp4
    05:18
  • 55 Packet Examples.mp4
    15:11
  • 56 IPv4.mp4
    01:58
  • 57 Identifying IPv4.mp4
    08:00
  • 58 IPv4 Communication.mp4
    13:54
  • 59 IPv4 Addressing.mp4
    11:06
  • 60 Where is IPv4 in our Packet-.mp4
    13:37
  • 61 Packet Examples.mp4
    05:32
  • 62 To the Boolean-Mobile-.mp4
    09:34
  • 63 Knowing the Basic Filters.mp4
    06:21
  • 64 Expanding on Basic Filters.mp4
    10:45
  • 65 Syntax is Everything.mp4
    11:19
  • 66 Apply Filtering to Live Capture.mp4
    06:25
  • 67 Wireshark Display Filters.mp4
    01:21
  • 68 Layer 4 and Beyond.mp4
    05:46
  • 69 Pen to Paper.mp4
    10:37
  • 70 DNS.mp4
    10:36
  • 71 Microsoft Protocols.mp4
    08:51
  • 72 HTTP.mp4
    10:27
  • 73 Advanced Wireshark.mp4
    01:24
  • 74 Magic Numbers.mp4
    11:25
  • 75 Regular Expressions.mp4
    09:27
  • 76 BPF Filtering.mp4
    10:32
  • 77 Supplemental Material .mp4
    13:31
  • 78 Introduction to Suricata.mp4
    03:24
  • 79 Installing Suricata.mp4
    09:59
  • 80 Continuing our Install.mp4
    07:02
  • 81 Setting up Suricata.mp4
    13:38
  • 82 Rule Configuration.mp4
    12:40
  • 83 DNS Communication.mp4
    09:08
  • 84 DNS Addressing.mp4
    12:18
  • 85 Where is DNS in our packet-.mp4
    11:21
  • 86 Packet Examples.mp4
    06:08
  • 87 Microsoft Protocols.mp4
    03:46
  • 88 NETBIOS.mp4
    13:21
  • 89 LDAP.mp4
    06:57
  • 90 RDP.mp4
    07:24
  • 91 Kerberos.mp4
    08:53
  • 92 SMB.mp4
    11:41
  • 93 RPC.mp4
    08:08
  • 94 Understanding HTTP on the Network.mp4
    12:00
  • 95 Files From Within.mp4
    12:59
  • 96 Looking for Web Traffic.mp4
    07:51
  • 97 Real-world Applications.mp4
    02:15
  • 98 Solarwinds.mp4
    09:42
  • 99 Starting up our Solarwinds.mp4
    12:38
  • 100 Basic Configurations.mp4
    12:46
  • 101 How to Research a Protocol.mp4
    02:32
  • 102 Theres something strange, and it dont look good.mp4
    09:28
  • 103 Requesting a comment.mp4
    07:25
  • 104 Tying in the Results to our Packets.mp4
    12:51
  • 105 What is this Protocol Used for-.mp4
    12:38
  • 106 Scapy.mp4
    01:57
  • 107 What is Scapy-.mp4
    06:54
  • 108 Installing Scapy.mp4
    11:05
  • 109 Crafting with Scapy.mp4
    11:54
  • 110 Making Our Packets Look Legit.mp4
    08:53
  • 111 Snort.mp4
    04:45
  • 112 What is Snort-.mp4
    09:03
  • 113 Installing Snort.mp4
    09:03
  • 114 Setting up Snort.mp4
    12:52
  • 115 Burp Suite.mp4
    03:03
  • 116 Getting the Software.mp4
    08:42
  • 117 Configuration of Burp Suite.mp4
    09:34
  • 118 Crawling Around.mp4
    12:53
  • 119 Burp Suite Detection.mp4
    11:15
  • 120 Zeek (Bro).mp4
    02:11
  • 121 Zeek Installation.mp4
    09:03
  • 122 Some of the Basics.mp4
    09:11
  • 123 Running Zeek.mp4
    09:10
  • 124 Examining the Results.mp4
    16:24
  • 125 Practice at Home.mp4
    05:22
  • 126 Network Architecture.mp4
    02:55
  • 127 The Internal Network.mp4
    06:46
  • 128 The External Network.mp4
    09:52
  • 129 Mapping out the Cloud.mp4
    09:05
  • 130 Putting Pen to Paper.mp4
    11:31
  • 131 Introduction to Network Monitoring at Scale.mp4
    04:27
  • 132 Understanding the Network.mp4
    07:28
  • 133 Solarwinds (Again).mp4
    14:00
  • 134 Monitoring with Solarwinds.mp4
    15:30
  • 135 Other Network Monitoring Options.mp4
    13:41
  • 136 IDS and IPS Evasion Theory.mp4
    02:31
  • 137 Understanding What Evasion Actually Is.mp4
    09:25
  • 138 Fragmentation.mp4
    10:10
  • 139 Spoofing.mp4
    10:16
  • 140 Sledding Past the IDS-IPS.mp4
    11:27
  • 141 Forging a Signature.mp4
    09:00
  • 142 Threat Hunting and Visualization.mp4
    02:02
  • 143 What is a Netflow-.mp4
    05:52
  • 144 Examining a Netflow.mp4
    07:00
  • 145 Replaying the Traffic.mp4
    12:14
  • 146 Is It Something Bad-.mp4
    09:31
  • 147 Stress Testing Our Packet Captures.mp4
    07:01
  • 148 Lets Review.mp4
    03:46
  • More details


    This intermediate SEC503 prepares cybersecurity specialists to analyze the content and behavior of a network's traffic, identify anomalous or unwanted traffic, and handle threats and intrusions.

    This course familiarizes security personnel with the equipment and techniques necessary to monitor a network and spot threats, intrusions, and potential incidents. This course covers everything you need to know to identify possible threats before they happen as well as what to do with intrusions once they've occurred. This is an advanced cybersecurity course, but the information in it would be valuable for nearly any cybersecurity professional, no matter where they are in their career.

    Once you're done with this cybersecurity skills training, you'll know how to analyze the content and behavior of a network's traffic, identify anomalous or unwanted traffic, and handle threats and intrusions.

    For anyone who manages cybersecurity specialists, this cybersecurity training can be used to onboard new cybersecurity specialists, curated into individual or team training plans, or as a cybersecurity reference resource.

    SEC503: What You Need to Know

    This SEC503 training has videos that cover topics such as:

    • Basics of intrusion detection and network security monitoring
    • Capturing and analyzing traffic based on deep network protocol familiarity
    • Identifying and investigating network-based attacks with packet analysis
    • Responding to and handling incidents

    Who Should Take SEC503 Training?

    This SEC503 training is considered associate-level cybersecurity training, which means it was designed for cybersecurity specialists. This network monitoring and threat detection skills course is designed for cybersecurity specialists with three to five years of experience with cybersecurity.

    New or aspiring cybersecurity specialists. If you want to work in cybersecurity, this course is a way to specialize and focus your technical expertise before you even begin your first job. Although you won't want to take this course if you have no previous cybersecurity training, you should take it if you want to fast-track your way to positions related to threat detection and response.

    Experienced cybersecurity specialists. If you've already got a few years of experience in cybersecurity, this course is a great way to build on that general foundation and focus it into one point: threat detection. Learn the intricacies of network traffic analysis, packet capture and analysis, and operating IDS and IPS – with that knowledge and experience, you'll be prepared for promotions to advanced security positions.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display

    Online training allows for the flexibility to learn or better a skill within a timeline and remote environment — that doesn't take away from work or family.

    Erik brings over 20 years of IT experience to his training. He holds nearly 20 IT certifications, the majority of which focus on cybersecurity. Prior to joining CBT Nuggets, he served as a First Sergeant in the U.S. Army. His interest in tech and eventually IT was spurred after receiving a 486 computer from his grandfather and learning Basic and Pascal. When Erik isn't creating training videos, he enjoys spending time with his family, going to professional wrestling events, and doing mechanical work.

    Certifications: Certifications: Certified Ethical Hacker, GIAC Continuous Monitoring Certification (GMON), GIAC Systems and Network Auditor (GSNA), GIAC Critical Controls Certification (GCCC),GIAC Certified Intrusion Analyst (GCIA) - Gold, GIAC Certified Incident Handler (GCIH), GIAC Certified Enterprise Defender (GCED), GIAC Security Essentials (GSEC), Microsoft MCSA: Server 2012, CompTIA Security+, CompTIA Cloud+, CompTIA A+, PMI® Project Management Professional (PMP)

    Areas of expertise: Digital forensics and cyber defense

    CBT Nuggets is renowned for providing innovative training that's informative, meaningful, and engaging. We provide a variety of training, primarily in IT, project management, and office productivity topics. Our comprehensive library contains thousands of training videos ranging from Cisco networking to Microsoft Word. Whether you want to pass a certification exam, increase your skills, or simply learn new things, we've got you covered! All of our training is delivered through high-quality online streaming video. Subscribers can train 24 hours a day, seven days a week, from the convenience of a computer or mobile device. CBT Nuggets trainers are the rock stars of training, renowned for their expertise, industry-wide credibility, and engaging personalities. They enable CBT Nuggets to deliver accurate, up-to-date training, using a laid-back whiteboard presentation style. There are no scripts, EVER. Our trainers love to teach, and it shows! CEO and founder Dan Charbonneau was a Microsoft trainer when he began recording CBT Nuggets' very first training videos back in the 1990s. He wanted to help provide large organizations, small teams and individuals with comprehensive and budget-conscious training, and he realized it couldn't be done in a classroom. From the CBT Nuggets World Headquarters in Eugene, Oregon, Dan and his team promise each video will be informative, comprehensive, accurate, and fun to watch.
    • language english
    • Training sessions 148
    • duration 21:40:10
    • English subtitles has
    • Release Date 2024/04/29