Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Network Security Monitoring (NSM) with Security Onion

Course Cover
compare button icon

Course Features

icon

Duration

139 minutes

icon

Delivery Method

Online

icon

Available on

Downloadable Courses

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Beginner

icon

Teaching Type

Self Paced

icon

Video Content

139 minutes

Course Description

Security professionals need to be able to monitor networks and prevent them from being attacked. This course Network Security Monitoring (NSM with Security Onion) will teach you about network security monitoring and how Security Onion can be used to monitor network security. You will first learn about NSM. Next, you'll learn about NSM and where it can be deployed. Finally, you will discover how to manage the triage process and generate real attacks. You will also learn how to perform network security monitoring within a production environment. Finally, you'll be able to create your own Security Onion environment to generate attacks. This course will equip you with the knowledge and skills to become a security analyst, security engineer or security architect. These skills can be easily transferred to commercial network security monitoring products found in enterprises.

Course Overview

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Hands-On Training,Instructor-Moderated Discussions

Skills You Will Gain

What You Will Learn

By the end of this course, you will have everything you need to further improve your skills as a security analyst, security engineer, or security architect

Finally, you will discover how you can perform network security monitoring in a production environment, and how to deploy your own Security Onion environment and generate attacks to dissect with it

First, you will learn what NSM is

Next, you will explore where you can deploy network sensors, how to handle the triage process by generating real attacks, how to detect attacks, and how to deploy and operate a Security Onion environment

These skills are easily transferable to other network security monitoring products, such as commercial ones commonly found in the enterprise

You will learn about network security monitoring as well as how to use Security Onion to perform network security monitoring

Course Cover