Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Network Analysis with Arkime

Course Cover
compare button icon

Course Features

icon

Duration

45 minutes

icon

Delivery Method

Online

icon

Available on

Downloadable Courses

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Self Paced

icon

Video Content

45 minutes

Course Description

The right tools are necessary to detect undetected threats within your network using proactive network analysis. This course, Network Analysis using Arkime, will teach you how Arkime can be used to detect malicious or anomalous network traffic within an enterprise environment. First, you'll gain insight into how to detect common malware delivery patterns. Next, you will learn how Arkime can be used to detect malware command and control. You'll also learn how to use Arkime's many features to detect data exfiltration. This course will equip you with the knowledge and skills to identify these techniques with Arkime.

Course Overview

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Instructor-Moderated Discussions

projects-img

Case Studies, Captstone Projects

Skills You Will Gain

What You Will Learn

Finally, you’ll utilize the many features of Arkime to identify data exfiltration

First, you'll gain insight into how to detect common malware delivery patterns

Learn how to utilize Arkime to detect anomalous or malicious network traffic in an enterprise environment

Next, you’ll learn how to use Arkime to identify malware command and control

When you’re finished with this course, you’ll have the skills and knowledge to detect these techniques using Arkime

Course Cover