They monitor traffic and compare it against the configured rules. Devices such as firewalls and IPS operate based on pre-configured rules. However, for large networks, an extra layer of protection must be added. These methods and technologies are used to introduce automated monitoring to the network, create security alerts, or automatically block offensive devices when something goes wrong. It requires using proven methods and a security infrastructure consisting of firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), and endpoint security software. This requires a defense-in-depth approach. Therefore, to mitigate threats, all networks must be secured and protected. “All networks are targets” is a common adage used to describe the current landscape of network security. In this activity, you will identify the processes running on a computer, the protocol they are using, and their local and remote port addresses.ġ5.0.3 Class Activity – What’s Going On 15.1 Introduction to Network Monitoring 15.1.1 Network Security Topology Introduction to Network Monitoring Tools Explain how network monitoring is conducted. Topic Title Topic Objective Introduction to Network Monitoring Explain the importance of network monitoring. Module Objective: Explain network traffic monitoring. Module Title: Network Monitoring and Tools Read more to learn about these methods and tools! 15.0.2 What Will I Learn in this Module? Since all networks are under attack, it is important for you to understand network monitoring and network monitoring tools to help you defend and protect the network. 15.0 Introduction 15.0.1 Why Should I Take this Module?
0 Comments
Leave a Reply. |