In order to investigate a network traffic capture, it is first necessary to capture it. This course discusses methods and considerations for data collection of network traffic. Topics include considerations for deployment of monitoring appliances and the use of virtualization and deception for data collection.
Introduction to Network Data CollectionDuration: 5:03
A brief introduction to data collection for network traffic analysis.
Monitoring Appliance DeploymentDuration: 18:03
Discussion of some of the important considerations when building a traffic analysis program.
Virtualization for Network Traffic AnalysisDuration: 12:48
Discussion of the use of virtualization and cloud computing for network traffic analysis.
Deceptive Technologies for Network Traffic AnalysisDuration: 24:10
Discussion of how deceptive technologies (e.g., honeypots) can be valuable for network data collection.
Meet the author
Howard Poston is a cybersecurity researcher with a background in blockchain, cryptography and malware analysis. He has a master's degree in Cyber Operations from the Air Force Institute of Technology and two years of experience in cybersecurity research and development at Sandia National Labs. He currently works as a freelance consultant providing training and content creation for cyber and blockchain security. He can be reached by email at firstname.lastname@example.org or via his website at https://www.howardposton.com.
You're in good company
"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had."
"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."
"I’ve taken five boot camps with Infosec and all my instructors have been great."