Learnabout the security-relevant characteristics of application data and how it can contribute to improving network security.
- Remember, software applications that communicate…through the internet are the senders and receivers of data…in a network packet.…They are the users of the packet delivery service…provided by a network infrastructure,…including operating systems, switches, and routers.…And these applications are also referred to…as network applications.…Keeping track of the heaLth and status…of a network application…is a critical aspect of network security…because ensuring its proper operation by mitigating threats…is the ultimate goal of network security.…
A popular mechanism used to collect this kind of information…is logging done by the network application itself.…Logging includes producing error messages and alerts…when there is a catastrophic anomaly like a system crash,…as well as a less severe event…such as a failed login attempt.…Logging can also be used for routine monitoring.…For example, you can design your server program…to generate log entries, also known as heartbeats,…every once in a while to report…that the system is alive and running.…
- Network security concepts
- The basic functions of a firewall
- Intrusion detection and prevention systems
- Using network data to improve security
- Using log servers to collect data
- Collecting application data
- Collecting OS data
- Network forensics
- Network security visualization
Skill Level Intermediate
1. Network Security Review
2. Network Data Sources
3. Data Collection
4. Data Analytics
Network forensics2m 25s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.