Catalogue
detail

Catalogue
detail

TECHNOLOGIE DE L'INFORMATION

TECHNOLOGIE DE L'INFORMATION

Système d'information

Système d'information

Catalogue
detail

TECHNOLOGIE DE L'INFORMATION

Système d'information

SEC503: NETWORK MONITORING AND THREAT DETECTION IN-DEPTH

Catégorie

TECHNOLOGIE DE L'INFORMATION

Sous-catégorie

Système d'information

Code

SIF023

Objectifs de la formation

Configure and operate Snort, Suricata, and FirePOWER for network traffic analysis and intrusion detection.

Create and write efficient Snort, Suricata, and FirePOWER rules for threat detection.

Configure and run open-source Zeek to provide a hybrid traffic analysis framework.

Develop automated threat hunting correlation scripts in Zeek.

Understand TCP/IP layers to identify normal and abnormal traffic for threat detection.

Utilize traffic analysis tools to identify signs of compromise or active threats.

Perform network forensics to investigate traffic, identify TTPs (Tactics, Techniques, and Procedures), and detect active threats.

Extract files and other types of content from network traffic to reconstruct events.

Create BPF (Berkeley Packet Filter) filters to selectively examine specific traffic traits at scale.

Use Scapy to craft custom packets for network testing and analysis.

Leverage NetFlow/IPFIX tools to detect network behavior anomalies and potential threats.

Apply knowledge of network architecture and hardware to customize the placement of network monitoring sensors and sniff traffic off the wire.

Programme de la formation

Public cible

Engineers • System administrators • Technical security managers • CND analysts • Security monitoring specialists • Cyber threat investigators

Durée (Jours)

6

Nombre de place min

5

Nombre de place max

5

Formateur

SANS

Create a free website with Framer, the website builder loved by startups, designers and agencies.