Monitoring a wireless network has its own set of technological challenges. In this video, you’ll learn about wireless survey tools, capturing wireless packets, and the analysis of wireless data.
When a security event occurs, the organization will need to completely understand the business impact of the event. In this video, you’ll learn strategies that you can use to determine the true impact to the business.
The era of big data has arrived, and we’re now faced with analyzing more data than ever before. In this video, you’ll learn about big data analysis and the techniques that we’re using to sift through our huge data stores.
If you can see the packets, then you see everything. In this video, you’ll learn about packet analysis and how packet-based attacks can provide the hacker with extensive information about your traffic patterns and application data.
The traffic on your network contains a wealth of information. In this video, you’ll learn about traffic analysis techniques that you can use to keep your network running smoothly.
An event that affects business continuity is a big concern for security professionals. In this video, you’ll learn more about the questions and issues associated with the impact of an event to the business.
Every network and security device creates logs, and analyzing the log can often provide important security information. In this video, you’ll learn about the log creation process and the tools you can use to analyze security logs.
Wireless networks are very susceptible to wireless monitoring. In this video, you’ll learn how to capture packets on your wireless network and ways that you can protect yourself from wireless packet analysis on open WiFi networks.