Cisco NetFlow for Cyber Security Big Data Analytics – آنالیز امنیت سایبری داده های بزرگ

Netflow یکی از تکنولوژی های سیسکو است که به آنالیز و ارائه اطلاعات در مورد بسته های ارسالی بر روی روتر یا سوییچ شما در شبکه می پردازد. netflow به عنوان یک استاندارد عمومی تبدیل شده است و توسط شرکت هایی غیر از سیسکونیز مورد استفاده قرار گرفته است. آنالیز ترافیک(Netflow) را می توان فقط برای یک اینترفیس خاص فعال کرد. جریان ترافیک به صورت یک طرفه براساس بسته های ارسالی بین مبدا و مقصد مشخص می شود.

لینک دانلود ویدئو آموزشی Cisco NetFlow for Cyber Security Big Data Analytics

 

حجم: 2.05 گيگابايت

دانلود – بخش اول
دانلود – بخش دوم
دانلود – بخش سوم

رمز فايل: technet24.ir

  • Copyright 2016
  • Edition: 1st
  • Price: $199.99
  • By Omar Santos
  • Published Apr 25, 2016 by Cisco Press
  • ISBN-10: 1-58720-592-0
  • ISBN-13: 978-1-58720-592-7

More than 6 hours of video training covering everything you need to know to deploy, configure, and troubleshoot NetFlow in many different Cisco platforms and learn big data analytics technologies for cyber security.

Description
Cisco NetFlow LiveLessons walks you through the steps for deploying, configuring, and troubleshooting NetFlow and learning big data analytics technologies for cyber security. Cisco NetFlow creates an environment where network administrators and security professionals have the tools to understand who, what, when, where, and how network traffic is flowing. Cisco NetFlow LiveLessons is a key resource for understanding the power behind the Cisco NetFlow solution.

Omar Santos, a Cisco Product Security Incident Response Team (PSIRT) technical leader and author of Network Security with NetFlow and IPFIX, the CCNA Security 210-260 Official Cert Guide, and other key security video and book titles by Cisco Press demonstrates how NetFlow can be used by large enterprises and small-to-medium-sized businesses to meet critical network challenges. This video courseexplores everything you need to understand and implement the Cisco Cyber Threat Defense Solution, while also providing configuration and troubleshooting walk-throughs.

What You Will Learn
NetFlow and IPFIX basics
NetFlow Deployment Scenarios
Cisco Flexible NetFlow
NetFlow Commercial and Open Source Monitoring and Analysis Software Packages
Big Data Analytics Tools
The Cisco Cyber Threat Defense Solution
Troubleshooting NetFlow
NetFlow for Anomaly Detection and Identifying DoS Attacks
NetFlow for Incident Response and Forensics

Who Should Take This Course

Network and security professionals interested in learning about the Cisco NetFlow solution; anyone wishing to build Cisco security

Table of Contents

Lesson 1: Introduction to NetFlow and IPFIX

1.1: Introduction to NetFlow

1.2: The Attack Continuum

1.3: The Network as a Sensor and as an Enforcer

1.4: What Is a Flow?

1.5: NetFlow Versus IP Accounting and Billing

1.6: NetFlow for Network Security

1.7: Traffic Engineering and Network Planning

1.8: Introduction to IP Flow Information Export (IPFIX)

1.9: Cisco Supported Platforms for NetFlow

1.10: NetFlow Versions and History

Lesson 2: NetFlow Deployment Scenarios

2.1: Introduction to Cisco Cyber Threat Defense

2.2: Deployment Scenario: User Access Layer

2.3: Deployment Scenario: Wireless LAN

2.4: Deployment Scenario: Internet Edge

2.5: Deployment Scenario: Data Center

2.6: Deployment Scenario: NetFlow in Site-to-Site and Remote VPNs

2.7: NetFlow Collection Considerations and Best Practices

2.8: Determining the Flows per Second and Scalability

Lesson 3: Cisco Flexible NetFlow

3.1: Introduction to Cisco Flexible NetFlow

3.2: Flexible NetFlow Records

3.3: Flow Monitors, Exporters, and Samplers

3.4: Flexible NetFlow Configuration

3.5: Flexible NetFlow IPFIX Export Format

Lesson 4: NetFlow Commercial and Open Source Monitoring and Analysis Software Packages

4.1: Commercial NetFlow Monitoring and Analysis Software Packages

4.2: NFdump

4.3: NfSen

4.4: SiLK

4.5: Elasticsearch, Logstash, and Kibana Stack (ELK)

Lesson 5: Big Data Analytics and NetFlow

5.1: Introduction to Big Data Analytics for Cyber Security

5.2: NetFlow and Other Telemetry Sources for Big Data Analytics for Cyber Security

5.3: OpenSOC

5.4: Hadoop, Flume, Kafka, Storm, and Hive

5.5: HBase

5.6: Third-Party Analytic Tools and Other Big Data Software

5.7: Understanding Big Data Scalability: Big Data Analytics in the Internet of Everything

Lesson 6: Cisco Cyber Threat Defense and NetFlow

6.1: Overview of the Cisco Cyber Threat Defense Solution

6.2: Deploying the Lancope StealthWatch System

6.3: Deploying NetFlow Secure Event Logging in the Cisco ASA

6.4: Deploying NSEL in Cisco ASA Configured for Clustering

6.5: Configuring NSEL in the Cisco ASA

6.6: Configuring NetFlow in the Cisco Nexus 1000V

6.7: Configuring NetFlow in the Cisco Nexus 7000 Series

Lesson 7: Troubleshooting NetFlow

7.1: Troubleshooting NetFlow in Cisco IOS and Cisco IOS XE Devices

7.2: Troubleshooting NetFlow in Cisco NX-OS Software

7.3: Troubleshooting NetFlow in Cisco IOS-XR Software

7.4: Troubleshooting NetFlow in the Cisco ASA

Lesson 8: Using NetFlow for Anomaly Detection and Identifying DoS Attacks

8.1: The Different Types of DDoS Attacks

8.2: Using NetFlow in Enterprise Networks to Detect DDoS Attacks

8.3: Using NetFlow in Service Provider Networks to Detect DDoS Attacks

Lesson 9: Using NetFlow for Incident Response and Forensics

9.1: Using NetFlow for the Identification of Credit Card Theft

9.2: Using NetFlow for the Identification of Theft of Intellectual Property

9.3: Using NetFlow for Monitoring Guest Users and Contractors

9.4: Using NetFlow for Capacity Planning

9.5: Using NetFlow to Monitor Cloud Usage

90%
Awesome
  • Design
دیدگاه

آدرس ایمیل شما منتشر نخواهد شد.