Today’s security technologies use different techniques for allowing traffic flows through the network. In this video, you’ll learn about firewall-based stateful inspection and how to perform simple packet filtering in other network devices.
If you can see the packets, then you see everything. In this video, you’ll learn about packet analysis and how packet-based attacks can provide the hacker with extensive information about your traffic patterns and application data.
The traffic on your network contains a wealth of information. In this video, you’ll learn about traffic analysis techniques that you can use to keep your network running smoothly.
The technologies behind our wide area networks are varied, but there are two major types of WANs that we use today. In this video, you’ll learn about circuit switched networks and packet switched networks and which technologies fit into each of these WAN categories.
The information traversing the network can be a valuable source of forensic data. In this video, you’ll learn about some common data gathering techniques for network traffic data.
Wireless networks are very susceptible to wireless monitoring. In this video, you’ll learn how to capture packets on your wireless network and ways that you can protect yourself from wireless packet analysis on open WiFi networks.
Which network troubleshooting utility can be used to track the path a packet takes through the network?
The network is a constantly moving river of information, and it may be necessary to occasionally test the water as it flows by. In this video module, you’ll learn the reasons for scanning your network and the different technologies available to gather information. We’ll also dive into packet analyzers, intrusion detection systems, intrusion prevention systems, and port scanners.
The world of network monitoring is a precise science, and it can provide insight into aspects of network performance that would otherwise go unseen. In this module, you’ll learn the use of network analyzers, connectivity software, and load testers to help build a more efficient network. You’ll also learn the value of logs and how the consolidation of logs files can assist in solving issues that span multiple devices.