Learn about the security-relevant characteristics of firewall logs and how they can contribute to improving network security.
- [Instructor] Let's continue talking about capturing data.…Firewalls are another rich source of network data.…You can generate logs of various firewall activities.…Firewalls utilize user-defined rules…to decide on what to do with a packet that goes through.…Firewall rules are primarily used for three actions,…accept, drop or forward packets.…Firewalls usually create a log entry…when they detect and drop packets destined to…an unexpected host or application.…
This log entry contains information on…where the packet originated and where it is…intended to go.…The origin address information is captured by an IP address…and a port number found in the header portion of a packet.…As you may remember, each internet host has…a unique IP address.…A port number is associated with an application…running on the host.…For example, a web server conventionally uses…80 as its port number.…
Using a combination of the port number and the IP address,…we know what application on which host is sending a packet…to the firewall.…On the other hand, the destination IP and port specified…
- Network security concepts
- The basic functions of a firewall
- Intrusion detection and prevention systems
- Using network data to improve security
- Using log servers to collect data
- Collecting application data
- Collecting OS data
- Network forensics
- Network security visualization
Skill Level Intermediate
1. Network Security Review
2. Network Data Sources
3. Data Collection
4. Data Analytics
Network forensics2m 25s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.