Security teams need a complete understanding of potential security threats, both internal and external, that could disrupt the network. Stealthwatch can monitor networks for potential threats, but before it can, you need to know how to install and configure it.
Attacks on enterprise networks, whether they are a denial of service attacks or malware, have the potential to cause a lot of disruption. Moreover, attacks can come from an internal source in addition to external sources. SOC teams need a tool that will alert them when an attack is in progress and help them pinpoint the attacker and the target. SOC teams need Stealthwatch. In this course, Getting Started with Cisco Stealthwatch, you will not only learn how to install the various Stealthwatch components, but you will also discover how to configure and tune Stealthwatch. First, you will begin by looking at how Stealthwatch looks for threats. Next, you will go through how to install a Stealthwatch Management Console and Flow Collector before learning how to enable NetFlow on IOS-based network devices. Finally, after learning how to tune Stealthwatch, you will look at how to back up and upgrade a Stealthwatch system. When you’re finished with this course, you will have the skills and knowledge of Stealthwatch needed to support a Stealthwatch system on an enterprise network.
Martin is a network security engineer with several years experience in various markets including retail and aerospace in many different countries and at the moment works for a UK based tier 1 service provider working with technology from Cisco, F5, Checkpoint, Infoblox, and, of course, Juniper.
Course Overview (Music playing) Hi everyone, my name is Martin Brown, and welcome to my course Getting Started with Cisco Stealthwatch. I am a UK-based network engineer working for a tier 1 service provider. In this course, we're going to look at how Cisco Stealthwatch is able to monitor your network for attacks, intrusion attempts, and malware. We are then going to go through the installation of a Stealthwatch Management Console and Flow Collector before discussing how to configure and tune the system. We will then look at the examples of what will happen when Stealthwatch detects a security event. Some of the major topics that we will cover include performing the initial configuration of a Stealthwatch system, enabling NetFlow on iOS routers and switches, upgrading Stealthwatch to a later version, and backing up the Stealthwatch databases. By the end of this course, you should feel confident enough to install, support, and maintain a Stealthwatch system on an enterprise network. Before beginning this course, you should be familiar with Cisco iOS-based devices and have a basic understanding of security threats, such as malware and intrusion attacks. I hope you will join me on this journey to learn about how to enhance your network security monitoring capabilities with the Getting Started with Cisco Stealthwatch course at Pluralsight.