We may earn an affiliate commission when you visit our partners.
Daniel Lachance

Protecting your network is now more important than ever. You can accomplish this by comparing what you know should be on the network to current network and vulnerability scans in order to identify abnormal network devices and traffic.

Read more

Protecting your network is now more important than ever. You can accomplish this by comparing what you know should be on the network to current network and vulnerability scans in order to identify abnormal network devices and traffic.

Being able to identify what should and what shouldn't be on your network is the first step in identifying suspicious activity on your network. In this course, Security and Event Triage: Monitoring Assets and Topology, you will learn the techniques that can help you identify potential security breaches. First, you'll learn about the importance of continuously inventorying network devices so that you know what should be on your network. Next, you'll see how to analyze network device scans and network traffic patterns to establish a baseline and to identify anomalies. Finally, you'll explore how to analyze network vulnerability scans to identify weaknesses that require attention. When you're finished with this course, you'll know how to quickly and effectively identify network anomalies.

Enroll now

What's inside

Syllabus

Course Overview
Network Device Inventory
Network Scanning
Detecting Vulnerabilities
Read more

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Examines network security, which is highly relevant in industry and academia
Teaches techniques for identifying potential security breaches, which is a valuable skill for many roles
Covers network device inventory, network scanning, and detecting vulnerabilities, which are core skills for network security professionals
Taught by Daniel Lachance, who is recognized for their work in network security

Save this course

Save Security Event Triage: Monitoring Assets and Topology to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Security Event Triage: Monitoring Assets and Topology with these activities:
Follow tutorials on network monitoring and detection tools
Enhance understanding of network monitoring and detection techniques by following tutorials on tools such as Wireshark, tcpdump, and Security Onion
Show steps
  • Identify resources for tutorials on network monitoring and detection tools
  • Follow tutorials to install and use the tools
  • Practice using the tools to monitor network traffic and detect potential threats
Review Network Security by O'Reilly
Provide a foundational understanding of network security, threat modeling, intrusion detection, and DDoS defense
Show steps
  • Read chapters 1-3 and complete the exercises
  • Summarize the key concepts in your own words
Conduct a Network Vulnerability Assessment
Gain hands-on experience in identifying and mitigating network vulnerabilities by conducting a vulnerability assessment using tools such as Nessus or OpenVAS
Show steps
  • Install and configure a vulnerability scanning tool
  • Scan the network for vulnerabilities
  • Analyze the scan results and prioritize vulnerabilities
  • Develop a plan to mitigate the identified vulnerabilities
Two other activities
Expand to see all activities and additional details
Show all five activities
Security Incident Response Plan
Demonstrate understanding of incident response by creating a plan that outlines procedures for detecting, responding to, and recovering from security incidents
Show steps
  • Identify potential security threats and vulnerabilities
  • Develop procedures for detecting and responding to security incidents
  • Create a communication plan for notifying stakeholders of security incidents
Write a blog post on best practices for network security
Reinforce understanding of network security concepts by sharing knowledge through writing a blog post on best practices for securing networks
Show steps
  • Research best practices for network security
  • Write a blog post outlining the best practices and their benefits
  • Publish the blog post and share it with others

Career center

Learners who complete Security Event Triage: Monitoring Assets and Topology will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
Information Security Analysts, also known as Cybersecurity Analysts, investigate and identify security vulnerabilities and threats to computer systems. They implement safeguards to mitigate risks and protect systems from unauthorized access. This course can help build a foundation for this role by teaching you the techniques used to identify network anomalies and security breaches.
Incident Responder
Incident Responders investigate and respond to security incidents. They work with security systems and technologies to contain and mitigate the impact of security breaches. This course can help build a foundation for this role by teaching you the techniques used to identify network anomalies and security breaches.
Cybersecurity Engineer
Cybersecurity Engineers design, implement, and maintain computer security systems. They protect networks and systems from unauthorized access and cyberattacks. This course can help build a foundation for this role by teaching you the techniques used to identify network anomalies and security breaches.
Security Operations Center (SOC) Analyst
SOC Analysts monitor and analyze security data from across an organization to identify and mitigate security threats and incidents. They work with security systems and technologies to protect networks and systems from unauthorized access and cyberattacks. This course can help build a foundation for this role by teaching you the techniques used to identify network anomalies and security breaches.
Security Analyst
Security Analysts monitor and analyze security data to identify and mitigate security threats and incidents. They work with security systems and technologies to protect networks and systems from unauthorized access and cyberattacks. This course can help build a foundation for this role by teaching you the techniques used to identify network anomalies and security breaches.
Network Security Engineer
Network Security Engineers design, implement, and maintain network security systems and devices. They work with firewalls, intrusion detection systems, and other security technologies to protect networks from unauthorized access and cyberattacks. This course can help build a foundation for this role by teaching you the techniques used to identify network anomalies and security breaches.
Cybersecurity Researcher
Cybersecurity Researchers develop new methods and techniques for protecting computer systems and networks from cyberattacks. They work with security systems and technologies to identify and mitigate security vulnerabilities and threats. This course may be useful for developing knowledge and skills in network security and threat detection.
IT Manager
IT Managers plan, organize, and direct the activities of an organization's IT department. They are responsible for the overall operation and management of IT systems and networks. This course may be useful for developing knowledge and skills in network security and threat detection.
Security Consultant
Security Consultants provide advice and guidance to organizations on security best practices and risk management. They help organizations identify and mitigate security vulnerabilities and threats. This course may be helpful for developing knowledge and skills in network security and threat detection.
Security Architect
Security Architects design and implement security measures to protect computer networks and systems. They analyze security risks and vulnerabilities, and develop plans to mitigate them. This course may be useful for developing knowledge and skills in network security and threat detection.
Threat Intelligence Analyst
Threat Intelligence Analysts research and analyze cyber threats and vulnerabilities. They provide organizations with information about the latest threats and how to mitigate them. This course may be useful for developing knowledge and skills in network security and threat detection.
Cloud Security Architect
Cloud Security Architects design and implement security measures for cloud computing environments. They ensure that cloud-based systems and data are protected from unauthorized access and cyberattacks. This course may be useful for developing knowledge and skills in network security and threat detection.
Systems Engineer
Systems Engineers design, implement, and maintain computer systems. They work with hardware, software, and networks to ensure that systems meet business requirements. This course may be useful for building a foundation in network monitoring and security.
Network Administrator
Network Administrators manage and maintain computer networks. They install and configure network devices, and monitor network traffic to ensure smooth operation. This course may be helpful for building a foundation in network monitoring and security.
Network Engineer
Network Engineers design, implement, and maintain computer networks. They install and configure network devices, and monitor network traffic to ensure smooth operation. This course may be helpful for building a foundation in network monitoring and security.

Reading list

We've selected nine books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Security Event Triage: Monitoring Assets and Topology.
Provides background knowledge on network analysis tools and techniques and prepares students for the Wireshark Certified Network Analyst certification.
Provides a comprehensive overview of network security assessment techniques and methodologies.
Provides a collection of security best practices and case studies in network security.
Serves as an excellent resource for understanding the principles and practices of network intrusion detection systems.
Provides guidance on implementing and managing network security configuration management practices.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Security Event Triage: Monitoring Assets and Topology.
OpenVAS Concepts and Scanning
Most relevant
AWS Cost Optimization Deep Dive
Most relevant
Vulnerability Analysis with Nessus
Most relevant
Information Gathering and Vulnerability Scanning for...
Most relevant
Ethical Hacking: Vulnerability Analysis
Most relevant
Palo Alto Networks Cloud Security Fundamentals
Most relevant
Investigate Network Targets with Nexpose
Most relevant
Log4j Vulnerability: What You Should Know
Most relevant
Conducting Network Vulnerability Analysis
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser