Anomaly Detection: Network Anomaly Detection


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

In this 14-video course, learners can explore best practices for anomaly detection for network forensics with topics such as network behavior anomaly detection (NBAD), frequency analysis, identifying beaconing activity, and recognizing signs of brute force attacks. Also discover protocol and population analysis, HTTPS and SSH (Secure Shell) attacks, as well as triage methods. Begin with a look at concepts and applications of NBAD, then discover how to implement frequency analysis. Learn how to identify beaconing activity, and how to recognize the signs of a brute force attack. Next, learners examine protocol analysis approaches and techniques, and learn about HTTPS attacks, deducing the activity of encrypted web traffic. Analyze SSH authentication behavior; take an overview of population analysis; explore techniques used to reveal hidden connections with behavioral analysis; and learn how to differentiate between different NBAD triage methods. In the final tutorials, discover methods and techniques for performing network anomaly analysis and the benefits of anomaly detection, and examine how network forensics can be used to protect mission critical areas of business.



Expected Duration (hours)
1.2

Lesson Objectives

Anomaly Detection: Network Anomaly Detection

  • identify the objectives of the course
  • recognize concepts and applications of network behavior anomaly detection
  • recognize how to implement frequency analysis
  • identify beaconing activity
  • recognize the signs of a brute force attack
  • describe protocol analysis approaches and techniques
  • deduce activity of encrypted web traffic
  • analyze SSH authentication behavior
  • provide an overview of population analysis
  • describe techniques used to reveal hidden connections using behavioral analytics
  • differentiate between different NBAD triage methods
  • describe methods and techniques for performing network anomaly analysis and the benefits of anomaly detection
  • describe how network forensics can be used to protect mission critical areas of business
  • summarize the key concepts covered in this course
  • Course Number:
    it_saandtdj_02_enus

    Expertise Level
    Expert