Pluralsight is not an official partner or accredited training center of EC-Council. This course covers network scanning and monitoring techniques to ensure optimal network performance and to identity network security breaches.
Pluralsight is not an official partner or accredited training center of EC-Council. Network scanning is performed by malicious users and IT security professionals. In this course, Network Monitoring and Analysis, you'll learn the fundamental knowledge of common network scans run by attackers so that you can detect this activity. First, you'll explore attack signatures, network monitoring techniques, and OS fingerprinting. Next, you'll learn about common TCP and UDP scan types and how ARP poisoning allows attackers to funnel traffic through their stations. Finally, you'll learn how to use the free, open source, Wireshark network analyzer to capture and analyze network traffic. When you're finished with this course, you will have the skills and knowledge of network monitoring needed to detect and protect against attackers.
Daniel Lachance, CompTIA Security+, CompTIA A+®, CompTIA Network+®, CompTIA Server+, CompTIA Cloud Essentials, MCITP, MCTS, MCSA, is the owner of Lachance IT Consulting Inc. He is the author of the CompTIA Server+ Certification All-in-One Exam Guide, CompTIA Cloud Essentials Certification Study Guide, and co-author of CompTIA Security+ Certification Practice Exams.
Course Overview Hey everyone. I'm Dan Lachance, and welcome to my course, Network Monitoring and Analysis. As an IT security professional, having knowledge of network monitoring techniques and tools, along with the ability to interpret scan results, will help you optimize network performance and also to detect suspicious network activity. Some of the major topics that we're going to talk about include network attack signatures and monitoring techniques, OS fingerprinting, network scanning techniques, and how to use Wireshark to analyze network traffic. By the end of this course, you'll be able to determine the optimal placement of network monitoring solutions, you'll know how to detect malicious network reconnaissance activities on the network, and you'll also know how to interpret network captures gathered from the Wireshark tool. I hope you'll join me to learn about network monitoring and analysis here at Pluralsight.