Learn about the tools and techniques used for analyzing traffic passing over the network. This learning path covers identification and analysis of benign and malicious traffic, examples and case studies of extracting intelligence from traffic data, considerations when building a network monitoring program, and techniques for collecting and analyzing traffic data.

您将获得的技能
要了解的详细信息

添加到您的领英档案
1 项作业
了解顶级公司的员工如何掌握热门技能

该课程共有10个模块
Start out on this course by taking a look at what network traffic analysis is and some of its major applications. This introductory module describes network traffic analysis and discusses its applications for monitoring the functionality of networked systems and performing incident response investigations.
涵盖的内容
10个视频
10个视频•总计46分钟
- Welcome to network traffic analysis•5分钟
- What is network traffic analysis?•6分钟
- Functionality monitoring•8分钟
- Incident response life cycle•4分钟
- Preparation•4分钟
- Detection and analysis•4分钟
- Containment•5分钟
- Eradication•4分钟
- Recovery•1分钟
- Post-incident response•5分钟
In order to identify anomalous or malicious traffic in a network, it’s necessary to first understand what’s normal. This module discusses the fundamentals of networking, including the OSI model, the differences between TCP, UDP and ICMP and their intended uses, and the purposes of common high-level protocols like HTTP and SMTP.
涵盖的内容
18个视频
18个视频•总计56分钟
- Fundamentals of networking•3分钟
- The OSI Model•5分钟
- Basic network protocols•4分钟
- Internet protocol (IP)•4分钟
- Transmission control protocol (TCP)•6分钟
- User datagram protocol (UDP)•3分钟
- Internet control message protocol (ICMP)•5分钟
- Common network protocols•1分钟
- Address resolution protocol (ARP)•3分钟
- Domain name system (DNS)•5分钟
- File transfer protocol (FTP)•2分钟
- Hypertext transfer protocol (HTTP)•3分钟
- Internet relay chat (IRC)•2分钟
- Simple mail transfer protocol (SMTP)•1分钟
- Simple network management protocol (SNMP)•2分钟
- Secure shell (SSH)•2分钟
- Trivial file transfer protocol (TFTP)•1分钟
- Transport layer security (TLS)•4分钟
Wireshark is probably the most commonly used tool for network traffic analysis and will be used throughout this learning path. This module introduces some of the useful features of Wireshark and shows what the protocols discussed in the previous course look like in practice and how the various layers work together to make networking possible.
涵盖的内容
14个视频
14个视频•总计105分钟
- Introduction to Wireshark•7分钟
- Features of Wireshark•26分钟
- IP demo•12分钟
- TCP demo•8分钟
- UDP demo•5分钟
- ICMP demo•4分钟
- ARP demo•6分钟
- DNS demo•9分钟
- FTP demo•5分钟
- HTTP demo•7分钟
- IRC demo•4分钟
- SMTP demo•5分钟
- SSH demo•3分钟
- TFTP demo•4分钟
Wireshark is probably the most popular tool for network traffic analysis. However, it is not the only one available. This module provides an introduction to some alternatives to Wireshark, covering some of the most useful and unique features of Terminal Shark (Wireshark’s command-line equivalent), CloudShark and NetworkMiner.
涵盖的内容
3个视频
3个视频•总计32分钟
- Network mapper demo•17分钟
- Terminal shark demo•9分钟
- CloudShark Demo•5分钟
A common use of network traffic analysis is for performing incident response activities. The purpose of these actions is to extract useful intelligence from network captures that can help to inform the rest of the investigation. This module demonstrates how to extract certain types of useful data from a network capture file.
涵盖的内容
8个视频
8个视频•总计104分钟
- Intelligence collection•6分钟
- Network mapping demo•12分钟
- Content deobfuscation demo•15分钟
- Credential capture demo•10分钟
- TLS decryption demo•17分钟
- Web proxy demo•17分钟
- Online tools demo 1•21分钟
- Online tools demo 2•7分钟
An organization can be attacked over the network in a variety of different ways. However, some methods are more common than others. In this module, you will see what scanning, data exfiltration, DDoS attacks and attacks against IoT devices look like in a network capture in a series of demonstrations.
涵盖的内容
4个视频
4个视频•总计76分钟
- Scanning demo•22分钟
- Data exfiltration demo•18分钟
- DDOS attack demo•18分钟
- IoT attack demo•18分钟
Different types of incident response investigations lend themselves to network-based analysis to different degrees. This module consists of a series of demonstrations where analysis of network traffic is used to infer information about different types of malware, including remote access Trojans (RATs), fileless malware, network worms and multi-stage infections.
涵盖的内容
4个视频
4个视频•总计66分钟
- RAT demo•13分钟
- Fileless case study•16分钟
- Worm demo•14分钟
- Multistage malware demo•23分钟
In order to investigate a network traffic capture, it is first necessary to capture it. This module discusses methods and considerations for data collection of network traffic. Topics include considerations for deployment of monitoring appliances and the use of virtualization and deception for data collection.
涵盖的内容
4个视频
4个视频•总计60分钟
- Data collection•5分钟
- Monitoring appliance deployment•18分钟
- Virtualization for network traffic analysis•13分钟
- Deceptive technologies•24分钟
Having access to network traffic data is of very limited value without the ability to analyze it. In this module, you will learn about connection-based analysis, statistical analysis and event-based analysis, their relative pros and cons for different monitoring situations, and tools and techniques for performing them effectively.
涵盖的内容
9个视频
9个视频•总计144分钟
- Data analysis•5分钟
- Tools for data analysis•11分钟
- Scapy demo•21分钟
- Data analysis techniques•4分钟
- Connection analysis•9分钟
- Statistical analysis•22分钟
- Event-based analysis•42分钟
- YARA demo•18分钟
- Snort demo•12分钟
In this project, you will need to apply your knowledge and use common network traffic analysis tools to solve multiple challenges. Each challenge involves examining a network traffic capture file containing evidence of malicious activity, such as malware infection, data exfiltration and C2 (command-and-control) communications. You’ll need to find leaked credentials, analyze an attempted DDoS attack, extract files from captures and even more.
涵盖的内容
2个视频2篇阅读材料1个作业
2个视频•总计30分钟
- Network traffic analysis challenges introduction•14分钟
- Network traffic analysis challenges walkthrough•16分钟
2篇阅读材料•总计20分钟
- Network traffic analysis challenges files•10分钟
- Network traffic analysis hints and solutions•10分钟
1个作业•总计120分钟
- Network traffic analysis quiz•120分钟
位教师

提供方

提供方

Infosec believes knowledge is power when fighting cybercrime. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and privacy training to stay cyber-safe at work and home. Learn more at infosecinstitute.com.
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.

