Главная
Study mode:
on
1
Intro
2
Not all logs are equal
3
How do we know we are monitoring
4
Flow Data
5
Ingress and Egress
6
Firewall abstractions
7
ID placement
8
Traffic
9
Logging Devices
10
Alerts
11
Security Knowledge
12
CTF
13
Six Sigma
14
Critical Thinking
15
Need to Understand
Description:
Explore the intricacies of network monitoring and security in this 55-minute conference talk from BSides Knoxville 2015. Delve into the importance of differentiating between various types of logs and understanding what to monitor. Examine flow data, ingress and egress points, and firewall abstractions. Learn about strategic ID placement, traffic analysis, and logging devices. Discover the significance of alerts and security knowledge. Gain insights into Capture The Flag (CTF) exercises, Six Sigma methodologies, and critical thinking skills essential for effective network security. Understand the crucial need for comprehensive knowledge in this field to stay ahead of potential threats and vulnerabilities.

Back to the Future

Add to list
0:00 / 0:00