English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 4h 40m | 2.07 GB
Cisco NetFlow for Cyber Security Big Data Analytics walks you through the steps for deploying, configuring, and troubleshooting NetFlow and learning big data analytics technologies for cyber security. Cisco NetFlow creates an environment where network administrators and security professionals have the tools to understand who, what, when, where, and how network traffic is flowing. Cisco NetFlow LiveLessons is a key resource for understanding the power behind the Cisco NetFlow solution.
Omar Santos, a Cisco Product Security Incident Response Team (PSIRT) technical leader and author of Network Security with NetFlow and IPFIX, the CCNA Security 210-260 Official Cert Guide, and other key security video and book titles by Cisco Press demonstrates how NetFlow can be used by large enterprises and small-to-medium-sized businesses to meet critical network challenges. This video courseexplores everything you need to understand and implement the Cisco Cyber Threat Defense Solution, while also providing configuration and troubleshooting walk-throughs.
What You Will Learn
- NetFlow and IPFIX basics
- NetFlow Deployment Scenarios
- Cisco Flexible NetFlow
- NetFlow Commercial and Open Source Monitoring and Analysis Software Packages
- Big Data Analytics Tools
- The Cisco Cyber Threat Defense Solution
- Troubleshooting NetFlow
- NetFlow for Anomaly Detection and Identifying DoS Attacks
- NetFlow for Incident Response and Forensics
Table of Contents
01 Cisco NetFlow – Introduction
02 Learning objectives
03 1.1 Introduction to NetFlow
04 1.2 The Attack Continuum
05 1.3 The Network as a Sensor and as an Enforcer
06 1.4 What Is a Flow
07 1.5 NetFlow Versus IP Accounting and Billing
08 1.6 NetFlow for Network Security
09 1.7 Traffic Engineering and Network Planning
10 1.8 Introduction to IP Flow Information Export (IPFIX)
11 1.9 Cisco Supported Platforms for NetFlow
12 1.10 NetFlow Versions and History
13 Learning objectives
14 2.1 Introduction to Cisco Cyber Threat Defense
15 2.2 Deployment Scenario – User Access Layer
16 2.3 Deployment Scenario – Wireless LAN
17 2.4 Deployment Scenario – Internet Edge
18 2.5 Deployment Scenario – Data Center
19 2.6 Deployment Scenario – NetFlow in Site-to-Site and Remote VPNs
20 2.7 NetFlow Collection Considerations and Best Practices
21 2.8 Determining the Flows per Second and Scalability
22 Learning objectives
23 3.1 Introduction to Cisco Flexible NetFlow
24 3.2 Flexible NetFlow Records
25 3.3 Flow Monitors, Exporters, and Samplers
26 3.4 Flexible NetFlow Configuration
27 3.5 Flexible NetFlow IPFIX Export Format
28 Learning objectives
29 4.1 Commercial NetFlow Monitoring and Analysis Software Packages
30 4.2 NFdump
31 4.3 NfSen
32 4.4 SiLK
33 4.5 Elasticsearch, Logstash, and Kibana Stack (ELK) – Overview and Architecture
34 4.6 ELK – Installation and Configuration Files
35 Learning objectives
36 5.1 Introduction to Big Data Analytics for Cyber Security
37 5.2 NetFlow and Other Telemetry Sources for Big Data Analytics for Cyber Security
38 5.3 OpenSOC – Overview, Architecture, and Capabilities
39 5.4 OpenSOC – Operation and Enrichments
40 5.5 Hadoop
41 5.6 Flume, Kafka, Storm, and Hive
42 5.7 HBase
43 5.8 Third-Party Analytic Tools and Other Big Data Software
44 5.9 Understanding Big Data Scalability – Big Data Analytics in the Internet of Everything
45 Learning objectives
46 6.1 Cisco Cyber Threat Defense Solution – Overview
47 6.2 Cisco Cyber Threat Defense Solution – AMP
48 6.3 Cisco Cyber Threat Defense Solution – Threat Grid, Email Security, and Web Security
49 6.4 Cisco Cyber Threat Defense Solution – ISE
50 6.5 Deploying the Lancope StealthWatch System
51 6.6 Deploying NetFlow Secure Event Logging in the Cisco ASA
52 6.7 Deploying NSEL in Cisco ASA Configured for Clustering
53 6.8 Configuring NSEL in the Cisco ASA
54 6.9 Configuring NetFlow in the Cisco Nexus 1000V
55 6.10 Configuring NetFlow in the Cisco Nexus 7000 Series
56 Learning objectives
57 7.1 Troubleshooting NetFlow in Cisco IOS and Cisco IOS XE Devices
58 7.2 Troubleshooting NetFlow in Cisco NX-OS Software
59 7.3 Troubleshooting NetFlow in Cisco IOS-XR Software
60 7.4 Troubleshooting NetFlow in the Cisco ASA
61 Learning objectives
62 8.1 The Different Types of DDoS Attacks
63 8.2 Using NetFlow in Enterprise Networks to Detect DDoS Attacks
64 8.3 Using NetFlow in Service Provider Networks to Detect DDoS Attacks
65 Learning objectives
66 9.1 Using NetFlow for the Identification of Credit Card Theft
67 9.2 Using NetFlow for the Identification of Theft of Intellectual Property
68 9.3 Using NetFlow for Monitoring Guest Users and Contractors
69 9.4 Using NetFlow for Capacity Planning
70 9.5 Using NetFlow to Monitor Cloud Usage
71 Cisco NetFlow – Summary
Resolve the captcha to access the links!