Internet And Network Technologies
Anomaly Detection
Anomaly Detection: Aspects of Anomaly Detection
Anomaly Detection: Network Anomaly Detection

Anomaly Detection: Aspects of Anomaly Detection

Course Number:
it_saandtdj_01_enus
Lesson Objectives

Anomaly Detection: Aspects of Anomaly Detection

  • discover the key concepts covered in this course
  • recognize different anomalies or outliers, such as configuration faults or a malicious presence
  • describe the benefits of anomaly detection, such as early response and planning for the unexpected
  • recognize limitations of traditional approaches to anomaly detection, such as chasing false positives
  • differentiate between manual and automated detection techniques
  • describe the importance to building a profile of what is normal, such as user activity
  • describe multimodal attributes and how they relate to anomaly detection
  • differentiate between least frequency of occurrence and baselining
  • describe the benefits of machine learning
  • recognize the benefits of using auto-periodicity to aid in identifying anomalies
  • summarize the key concepts covered in this course

Overview/Description

Network anomalies are behaviors or activities that deviate from the norm. It is important that security professionals learn to monitor for these anomalies in network traffic because the traffic could be malicious traffic. Explore the role network and security professionals play in detecting and addressing anomalies, determining if anomalies are malicious, and best practices in monitoring and detection.



Target

Prerequisites: none

Anomaly Detection: Network Anomaly Detection

Course Number:
it_saandtdj_02_enus
Lesson Objectives

Anomaly Detection: Network Anomaly Detection

  • identify the objectives of the course
  • recognize concepts and applications of network behavior anomaly detection
  • recognize how to implement frequency analysis
  • identify beaconing activity
  • recognize the signs of a brute force attack
  • describe protocol analysis approaches and techniques
  • deduce activity of encrypted web traffic
  • analyze SSH authentication behavior
  • provide an overview of population analysis
  • describe techniques used to reveal hidden connections using behavioral analytics
  • differentiate between different NBAD triage methods
  • describe methods and techniques for performing network anomaly analysis and the benefits of anomaly detection
  • describe how network forensics can be used to protect mission critical areas of business
  • summarize the key concepts covered in this course

Overview/Description

Explore best practices for anomaly detection for network forensics with topics such as network behavior anomaly detection, frequency analysis, identifying beaconing activity, and recognizing the signs of a brute force attack. Also discover protocal and popluation analysis, HTTPS and SSH attacks, as well as triage methods.



Target

Prerequisites: none

Close Chat Live