Practical network security monitoring : using free software Elizabeth S. Graham
Material type:
- 978-1-09835-255-4
- GC TK 5105.5 G73 2020 c.1
Item type | Current library | Home library | Collection | Shelving location | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
NU BALIWAG | NU BALIWAG | Information Technology | General Circulation | GC TK 5105.5 G73 2020 c.1 (Browse shelf(Opens below)) | Available | NUBUL000004570 |
Part 1. Install and Configure Security Onion -- Part 2. SGUIL -- Part 3. Packet Capture (PCAP) Analysis -- Part 4. Security Onion Integrations -- Part 5. Visual Analysis Tools -- Part 6. Intrusion Detection System (IDS) Rules -- Part 7. Testing IDS Rules -- Part 8. Putting it all together -- Part 9. Test your knowledge -- Part 10. Answers to test your knowledge -- Part 11. Defending Against threats.
This book is intended to guide beginner through intermediate users how to use free software to collect, monitor, and analyze network traffic to detect, identify, and defend against cyber threats to your network. It provides practical exercise to learn how to use free software to identify threat s to your network. The practical exercises provide step-by-step instructions allowing you to install, configure, and use the free tools. This book is not intended to be an all- inclusive guide to defending your network and assets, but is intended to provide you with the hands-on experience to analyze your network traffic and determine is traffic is malicious.
There are no comments on this title.