Today’s security technologies use different techniques for allowing traffic flows through the network. In this video, you’ll learn about firewall-based stateful inspection and how to perform simple packet filtering in other network devices.
If you can see the packets, then you see everything. In this video, you’ll learn about packet analysis and how packet-based attacks can provide the hacker with extensive information about your traffic patterns and application data.
The traffic on your network contains a wealth of information. In this video, you’ll learn about traffic analysis techniques that you can use to keep your network running smoothly.
The technologies behind our wide area networks are varied, but there are two major types of WANs that we use today. In this video, you’ll learn about circuit switched networks and packet switched networks and which technologies fit into each of these WAN categories.
The network is a constantly moving river of information, and it may be necessary to occasionally test the water as it flows by. In this video module, you’ll learn the reasons for scanning your network and the different technologies available to gather information. We’ll also dive into packet analyzers, intrusion detection systems, intrusion prevention systems, and port scanners.
The world of network monitoring is a precise science, and it can provide insight into aspects of network performance that would otherwise go unseen. In this module, you’ll learn the use of network analyzers, connectivity software, and load testers to help build a more efficient network. You’ll also learn the value of logs and how the consolidation of logs files can assist in solving issues that span multiple devices.
Packet switched WAN networks are the latest technologies in wide area communication. In this video, you’ll learn about ATM, ADSL, MPLS, cable modem, and many more packet switched technologies.