01. Monitoring and Logging for Detection of Malicious Activity Lesson Introduction
Monitoring and Logging for Detection of Malicious Activity Lesson Introduction Heading
Monitoring and Logging for Detection of Malicious Activity Lesson Introduction
ND545 C02 L03 A01 Lesson Introduction V3
Monitoring and Logging for Detection of Malicious Activity Lesson Introduction Lesson Summary
Welcome to the monitoring lesson!
We'll learn about:
- System Events
- Network Monitoring
- We'll go over alert reports
- Finally we'll introduce SIEM's
Let's go!
By the end of this lesson students will be able to:
- Interpret between different types of logs.
- Define the basic parts of network traffic.
- Analyze network traffic.
- Explain the importance of a SIEM.
- Compare and contrast the benefits and issues of open source vs commercial SIEM
- Create basic queries to retrieve system information.

Lesson Overview