- Course
Security Event Triage: Monitoring Assets and Topology
Protecting your network is now more important than ever. You can accomplish this by comparing what you know should be on the network to current network and vulnerability scans in order to identify abnormal network devices and traffic.
- Course
Security Event Triage: Monitoring Assets and Topology
Protecting your network is now more important than ever. You can accomplish this by comparing what you know should be on the network to current network and vulnerability scans in order to identify abnormal network devices and traffic.
Get started today
Access this course and other top-rated tech content with one of our business plans.
Try this course for free
Access this course and other top-rated tech content with one of our individual plans.
This course is included in the libraries shown below:
- Security
What you'll learn
Being able to identify what should and what shouldn't be on your network is the first step in identifying suspicious activity on your network. In this course, Security and Event Triage: Monitoring Assets and Topology, you will learn the techniques that can help you identify potential security breaches. First, you'll learn about the importance of continuously inventorying network devices so that you know what should be on your network. Next, you'll see how to analyze network device scans and network traffic patterns to establish a baseline and to identify anomalies. Finally, you'll explore how to analyze network vulnerability scans to identify weaknesses that require attention. When you're finished with this course, you'll know how to quickly and effectively identify network anomalies.
Security Event Triage: Monitoring Assets and Topology
-
Module Introduction | 1m 21s
-
Assets and IT Risk Management | 4m 57s
-
Baselining the Network Environment | 3m 10s
-
Gathering Network Device Inventory | 5m 51s
-
Demo: Scan for network Devices Using PowerShell | 3m 52s
-
Analyzing Network Device Inventory | 4m 41s
-
Demo: Review Spiceworks Network Device Inventory | 3m 4s
-
Demo: Analyze Network Device Traffic Using Grassmarlin | 2m 43s
-
Module Summary | 1m 11s