Tags
Language
Tags
May 2024
Su Mo Tu We Th Fr Sa
28 29 30 1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31 1

Cisco Stealthwatch: Look Deep Into Networks

Posted By: ELK1nG
Cisco Stealthwatch: Look Deep Into Networks

Cisco Stealthwatch: Look Deep Into Networks
Published 8/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.67 GB | Duration: 5h 54m

Scan and mitigate attacks

What you'll learn
Scanning networking with Stealthwatch
Defending Organization with Stealthwatch
Mitigating cyberattacks with stealthwatch
Policies to get notified when breached
Requirements
CCNA
Description
Detect attacks across the dynamic network with high-fidelity alerts enriched with context such as user, device, location, timestamp, and application. Analyze encrypted traffic for threats and compliance, without decryption. Quickly detect unknown malware, insider threats like data exfiltration, policy violations, and other sophisticated attacks using advanced analytics. Store telemetry data for long periods for forensic analysis. Define smarter segmentation policies without disrupting the business. Create custom alerts to detect any unauthorized access and ensure compliance. Use Secure Network Analytics with Identity Services Engine (ISE) to enforce policies and contain threats.Challenges:Protecting a variety of sensitive member data and financial assetsBeing able to prove audit requirements and ensure other internal business and security policies are being enforcedMonitor a distributed network spread across 22 branches and multiple ATM locationsMaintaining a first-class security strategy and infrastructure with a lean teamSolutions:● Secure Network Analytics (Stealthwatch)● Identity Services Engine (ISE)● Secure Firewall (Firepower)● Secure Endpoint (AMP for Endpoints)● Umbrella● Secure Email (Cloud Email Security)● AnyConnect● Secure Malware Analytics (Threat Grid)Results● Unprecedented threat visibility with actionable alerts infused with context● Ability to easily prove audit requirements like cryptographic compliance, and to monitor for any business or security policy violations with custom alerts● Achieved automated detection and response across the network, endpoints and web, and extended investments with an integrated security architecture● Transitioned to a remote workforce without compromising on security and infrastructure uptime

Overview

Section 1: Introduction

Lecture 1 Introduction to Cisco Stealthwatch Technology

Lecture 2 Stealthwatch Installation

Lecture 3 Stealthwatch GUI

Lecture 4 Configure Router For NetFlow Collector Part -1

Lecture 5 Configure Router For NetFlow Collector Part -2

Lecture 6 Edit Config of SMC

Lecture 7 Configure Policies on Stealthwatch

Lecture 8 Install Applications in Stealthwatch

Lecture 9 AD integration with Stealthwatch Config

Lecture 10 Configure SMC with Java Client

Lecture 11 Configuring Host Policy with Java Client

Lecture 12 NetFlow Collector Packet Capture

Lecture 13 PxGrid Introduction

Lecture 14 PxGrid Certificate Template

Lecture 15 PxGrid LAB

security specialist, security auditors, cybersecurity specialist, network engieers, system engineers, security admins