Practical network security monitoring : using free software Elizabeth S. Graham
Material type:
- 978-1-09835-255-4
- GC TK 5105.5 G73 2020 c.1
Item type | Current library | Home library | Collection | Shelving location | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
NU BALIWAG | NU BALIWAG | Information Technology | General Circulation | GC TK 5105.5 G73 2020 c.1 (Browse shelf(Opens below)) | Available | NUBUL000004570 |
Browsing NU BALIWAG shelves, Shelving location: General Circulation, Collection: Information Technology Close shelf browser (Hides shelf browser)
No cover image available |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
GC T 173.8 .P66 2016 Rethink : the surprising history of new ideas / | GC TA 174 .H36 2014 AutoCAD 2014 : beginning and intermediate / | GC TJ 211.49 .M35 2020 What to expect when you're expecting robots : the future of human-robot collaboration / | GC TK 5105.5 G73 2020 c.1 Practical network security monitoring : using free software | GC TK 5105.875 .I57 .M58 2017 The art of invisibility : the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data / | GC TK 7881.25 .V36 2018 Smart homes in easy steps | GC TK 5105 .B43 2018 c.1 Networking Essentials : a compTIA network + N10-007 textbook / |
Part 1. Install and Configure Security Onion -- Part 2. SGUIL -- Part 3. Packet Capture (PCAP) Analysis -- Part 4. Security Onion Integrations -- Part 5. Visual Analysis Tools -- Part 6. Intrusion Detection System (IDS) Rules -- Part 7. Testing IDS Rules -- Part 8. Putting it all together -- Part 9. Test your knowledge -- Part 10. Answers to test your knowledge -- Part 11. Defending Against threats.
This book is intended to guide beginner through intermediate users how to use free software to collect, monitor, and analyze network traffic to detect, identify, and defend against cyber threats to your network. It provides practical exercise to learn how to use free software to identify threat s to your network. The practical exercises provide step-by-step instructions allowing you to install, configure, and use the free tools. This book is not intended to be an all- inclusive guide to defending your network and assets, but is intended to provide you with the hands-on experience to analyze your network traffic and determine is traffic is malicious.
There are no comments on this title.