The devices on our networks can create a massive amount of metrics, and it’s the responsibility of the network team to manage all of those logs and create some performance reports. In this video, you’ll learn about the management of logs and how all of that raw information can be converted into useful graphs and reports.
An operating system has hundreds of configuration options that can affect the security of the platform. In this video, you’ll learn about the customization of user rights, log settings, file permissions, and many more operating system options.
Out of the box, your operating system probably isn’t the most secure. In this video, you’ll learn some best practices for security your operating system from the bad guys.
Your system logs contain a wealth of security details. In this video, you’ll learn about the different log types and how they can be used to security your network.
The packets traversing network can be a wealth of information. In this video, you’ll learn how to collect information from network traffic and logs.
The idea of running multiple operating systems on a single piece of hardware has change the face of enterprise networking and security. In this video, you’ll learn about virtualization technology and the challenges of security in virtual environments.
The world of network monitoring is a precise science, and it can provide insight into aspects of network performance that would otherwise go unseen. In this module, you’ll learn the use of network analyzers, connectivity software, and load testers to help build a more efficient network. You’ll also learn the value of logs and how the consolidation of logs files can assist in solving issues that span multiple devices.