If you can see the packets, then you see everything. In this video, you’ll learn about packet analysis and how packet-based attacks can provide the hacker with extensive information about your traffic patterns and application data.
The traffic on your network contains a wealth of information. In this video, you’ll learn about traffic analysis techniques that you can use to keep your network running smoothly.
An event that affects business continuity is a big concern for security professionals. In this video, you’ll learn more about the questions and issues associated with the impact of an event to the business.
Every network and security device creates logs, and analyzing the log can often provide important security information. In this video, you’ll learn about the log creation process and the tools you can use to analyze security logs.
Wireless networks are very susceptible to wireless monitoring. In this video, you’ll learn how to capture packets on your wireless network and ways that you can protect yourself from wireless packet analysis on open WiFi networks.
Maintaining uptime and availability is a critical aspect of security management. In this video, you’ll learn about business impact analysis, continuity testing, disaster recovery, and succession planning.