Security teams need a complete understanding of potential security threats, both internal and external, that could disrupt the network. Stealthwatch can monitor networks for potential threats, but before it can, you need to know how to install and configure it.
Attacks on enterprise networks, whether they are a denial of service attacks or malware, have the potential to cause a lot of disruption. Moreover, attacks can come from an internal source in addition to external sources. SOC teams need a tool that will alert them when an attack is in progress and help them pinpoint the attacker and the target. SOC teams need Stealthwatch. In this course, Getting Started with Cisco Stealthwatch, you will not only learn how to install the various Stealthwatch components, but you will also discover how to configure and tune Stealthwatch. First, you will begin by looking at how Stealthwatch looks for threats. Next, you will go through how to install a Stealthwatch Management Console and Flow Collector before learning how to enable NetFlow on IOS-based network devices. Finally, after learning how to tune Stealthwatch, you will look at how to back up and upgrade a Stealthwatch system. When you’re finished with this course, you will have the skills and knowledge of Stealthwatch needed to support a Stealthwatch system on an enterprise network.
Martin is a network security engineer with several years experience in various markets including retail and aerospace in many different countries and at the moment works for a UK based tier 1 service provider working with technology from Cisco, F5, Checkpoint, Infoblox, and, of course, Juniper.
Course Overview [Autogenerated] Hi, everyone. My name is Martin Brown and welcome to my course. Getting started with Cisco Stealth Watch. I am a UK based network engineer working for a T one service provider. In this course, we're going to look at how Cisco Stealth Watch is able to monitor your network for tax intrusion attempts. A malware. We are then going to go for the installation of a stealth watch management console and flow collector before discussing, Had to configure and June the system. We will then look examples of what will happen when stealth watch detects the security of it. Some of the major topics that we will cover include performing the initial configuration off a stealth watch system, enabling Net float on IOS routers and switches upgrading still watch to a later version and backing up the stealth watch databases. By the end of this course, you should feel confident enough to install, support and maintain a stealth watch system on enterprise network before beginning this cause. You should be familiar with Cisco are West based devices and have a basic understanding of security threats such as malware and intrusion attacks. I hope you'll join me on this journey to learn about how to enhance your network security monitoring capabilities with E getting started with Cisco Stealth Watch course at your site.