01. Monitoring and Logging for Detection of Malicious Activity Lesson Introduction

Monitoring and Logging for Detection of Malicious Activity Lesson Introduction Heading

Monitoring and Logging for Detection of Malicious Activity Lesson Introduction

ND545 C02 L03 A01 Lesson Introduction V3

Monitoring and Logging for Detection of Malicious Activity Lesson Introduction Lesson Summary

Welcome to the monitoring lesson!

We'll learn about:

  • System Events
  • Network Monitoring
  • We'll go over alert reports
  • Finally we'll introduce SIEM's

Let's go!

By the end of this lesson students will be able to:

  • Interpret between different types of logs.
  • Define the basic parts of network traffic.
  • Analyze network traffic.
  • Explain the importance of a SIEM.
  • Compare and contrast the benefits and issues of open source vs commercial SIEM
  • Create basic queries to retrieve system information.

Lesson Overview

Lesson Overview