Advanced Network Analysis and Incident Response
Instructor: Jason Crossland
Intermediate Level • 46 hours to complete 3 weeks at 15 hours a week • Flexible Schedule
What You'll Learn
- Understand the differences between network situational awareness and traditional NIDS for effective incident detection.
- Gain proficiency in using GOTS and COTS tools for network packet analysis and troubleshooting networking challenges.
- Learn to conduct ROC analysis on IDS data and interpret event graphs and precision-recall metrics for better decision-making.
- Explore the NIST Cybersecurity Framework and SANS Incident Response Cycle to effectively manage and respond to cyber incidents.
Skills You'll Gain
NIST 800-53
Network Analysis
Network Monitoring
Cyber Threat Intelligence
Computer Security Incident Management
Cloud Security
Network Security
Anomaly Detection
Intrusion Detection and Prevention
Incident Response
Cyber Security Strategy
Threat Detection
Shareable Certificate
Earn a shareable certificate to add to your LinkedIn profile
Outcomes
-
Learn new concepts from industry experts
-
Gain a foundational understanding of a subject or tool
-
Develop job-relevant skills with hands-on projects
-
Earn a shareable career certificate
There are 7 modules in this course
This course provides a comprehensive exploration of network analysis and incident response strategies, focusing on the differentiation between Network Situational Awareness and Intrusion Detection Systems. Students will learn to apply anomaly detection techniques and utilize various network packet analysis tools. The curriculum includes developing alarm systems through Graph Analysis and interpreting key performance metrics like ROC analysis. Emphasis is placed on evaluating incident response mechanisms and understanding the implications of Artificial Intelligence in cybersecurity. Participants will also gain practical skills in applying the NIST Cybersecurity Framework and the SANS Incident Response Cycle to real-world scenarios.
This course dives into advanced network situational awareness, exploring how it differs from conventional NIDS.
This module introduces foundational concepts in Network Packet Analysis, providing insights into both government-off-the-shelf (GOTS) and commercial-off-the-shelf (COTS) tools used for analyzing network traffic.
This module will guide students through the process of conducting ROC analysis on IDS data and interpreting various graphical representations, including event graphs, precision-recall (P-R) graphs, and thresholds.
This module focuses on the importance of aligning response strategies with organizational security policies, while also evaluating the risks associated with automated responses.
This course explores the complexities of intrusion detection and response in constrained environments.
This course delves into the application of the NIST Cybersecurity Framework (CSF) 2.0 and the SANS Incident Response Cycle in managing cyber incidents.