SKIP THE SHIPPING
Use code NOSHIP during checkout to save 40% on eligible eBooks, now through January 5. Shop now.
Video accessible from your Account page after purchase.
Register your product to gain access to bonus material or receive a coupon.
More than 6 hours of video training covering everything you need to know to deploy, configure, and troubleshoot NetFlow in many different Cisco platforms and learn big data analytics technologies for cyber security.
Description
Cisco NetFlow LiveLessons walks you through the steps for deploying, configuring, and troubleshooting NetFlow and learning big data analytics technologies for cyber security. Cisco NetFlow creates an environment where network administrators and security professionals have the tools to understand who, what, when, where, and how network traffic is flowing. Cisco NetFlow LiveLessons is a key resource for understanding the power behind the Cisco NetFlow solution.
Omar Santos, a Cisco Product Security Incident Response Team (PSIRT) technical leader and author of Network Security with NetFlow and IPFIX, the CCNA Security 210-260 Official Cert Guide, and other key security video and book titles by Cisco Press demonstrates how NetFlow can be used by large enterprises and small-to-medium-sized businesses to meet critical network challenges. This video courseexplores everything you need to understand and implement the Cisco Cyber Threat Defense Solution, while also providing configuration and troubleshooting walk-throughs.
Skill Level
What You Will Learn
Who Should Take This Course
Table of Contents
Lesson 1: Introduction to NetFlow and IPFIX
1.1: Introduction to NetFlow
1.2: The Attack Continuum
1.3: The Network as a Sensor and as an Enforcer
1.4: What Is a Flow?
1.5: NetFlow Versus IP Accounting and Billing
1.6: NetFlow for Network Security
1.7: Traffic Engineering and Network Planning
1.8: Introduction to IP Flow Information Export (IPFIX)
1.9: Cisco Supported Platforms for NetFlow
1.10: NetFlow Versions and History
Lesson 2: NetFlow Deployment Scenarios
2.1: Introduction to Cisco Cyber Threat Defense
2.2: Deployment Scenario: User Access Layer
2.3: Deployment Scenario: Wireless LAN
2.4: Deployment Scenario: Internet Edge
2.5: Deployment Scenario: Data Center
2.6: Deployment Scenario: NetFlow in Site-to-Site and Remote VPNs
2.7: NetFlow Collection Considerations and Best Practices
2.8: Determining the Flows per Second and Scalability
Lesson 3: Cisco Flexible NetFlow
3.1: Introduction to Cisco Flexible NetFlow
3.2: Flexible NetFlow Records
3.3: Flow Monitors, Exporters, and Samplers
3.4: Flexible NetFlow Configuration
3.5: Flexible NetFlow IPFIX Export Format
Lesson 4: NetFlow Commercial and Open Source Monitoring and Analysis Software Packages
4.1: Commercial NetFlow Monitoring and Analysis Software Packages
4.2: NFdump
4.3: NfSen
4.4: SiLK
4.5: Elasticsearch, Logstash, and Kibana Stack (ELK)
Lesson 5: Big Data Analytics and NetFlow
5.1: Introduction to Big Data Analytics for Cyber Security
5.2: NetFlow and Other Telemetry Sources for Big Data Analytics for Cyber Security
5.3: OpenSOC
5.4: Hadoop, Flume, Kafka, Storm, and Hive
5.5: HBase
5.6: Third-Party Analytic Tools and Other Big Data Software
5.7: Understanding Big Data Scalability: Big Data Analytics in the Internet of Everything
Lesson 6: Cisco Cyber Threat Defense and NetFlow
6.1: Overview of the Cisco Cyber Threat Defense Solution
6.2: Deploying the Lancope StealthWatch System
6.3: Deploying NetFlow Secure Event Logging in the Cisco ASA
6.4: Deploying NSEL in Cisco ASA Configured for Clustering
6.5: Configuring NSEL in the Cisco ASA
6.6: Configuring NetFlow in the Cisco Nexus 1000V
6.7: Configuring NetFlow in the Cisco Nexus 7000 Series
Lesson 7: Troubleshooting NetFlow
7.1: Troubleshooting NetFlow in Cisco IOS and Cisco IOS XE Devices
7.2: Troubleshooting NetFlow in Cisco NX-OS Software
7.3: Troubleshooting NetFlow in Cisco IOS-XR Software
7.4: Troubleshooting NetFlow in the Cisco ASA
Lesson 8: Using NetFlow for Anomaly Detection and Identifying DoS Attacks
8.1: The Different Types of DDoS Attacks
8.2: Using NetFlow in Enterprise Networks to Detect DDoS Attacks
8.3: Using NetFlow in Service Provider Networks to Detect DDoS Attacks
Lesson 9: Using NetFlow for Incident Response and Forensics
9.1: Using NetFlow for the Identification of Credit Card Theft
9.2: Using NetFlow for the Identification of Theft of Intellectual Property
9.3: Using NetFlow for Monitoring Guest Users and Contractors
9.4: Using NetFlow for Capacity Planning
9.5: Using NetFlow to Monitor Cloud Usage
About LiveLessons Video Training
LiveLessons Video Training series publishes hundreds of hands-on, expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. This professional and personal technology video series features world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, IBM Press, Pearson IT Certification, Prentice Hall, Sams, and Que. Topics include: IT Certification, Programming, Web Development, Mobile Development, Home and Office Technologies, Business and Management, and more. View all LiveLessons on InformIT at http://www.informit.com/livelessons