Rating 4.88 out of 5 (8 ratings in Udemy)
What you'll learn- Security Visualization Basics, Security Data Sources, Security Use-Cases
- How to Collect Data From Network, From Operating System and Other Points
- Microsoft's Secret Weapon for Log Parsing for All Kind of Log Files Including Event Logs
- Detailed Examination of Display Types and Properties Which Are Useful for the Visualization of Security Data
- Most Useful Interaction Techniques When Dealing With Security Use-Cases
- Technologies in …
Rating 4.88 out of 5 (8 ratings in Udemy)
What you'll learn- Security Visualization Basics, Security Data Sources, Security Use-Cases
- How to Collect Data From Network, From Operating System and Other Points
- Microsoft's Secret Weapon for Log Parsing for All Kind of Log Files Including Event Logs
- Detailed Examination of Display Types and Properties Which Are Useful for the Visualization of Security Data
- Most Useful Interaction Techniques When Dealing With Security Use-Cases
- Technologies in a Nutshell- Quick Starter Guide and Exercises for Most Relevant Technologies Including TcpDump, WinDump and WireShark
- Lists of Related Academic Studies and Scientific Reading Materials for Some Topics
- Format and Attribute Descriptions From Security Protection Systems and Network Data
- Most Useful Python Data Structures and Data Operations To Be Used When Preparing Data For Visualization
- Applied Lectures to Immediately Install and Start Visualization with Python
- Introduction to JavaScript Visualization Libraries for JavaScript Lovers
- Downloadable Code and Exercise Files and Associated Sample Data Including Network Traffic Data, Modern Honey Network Data, IIS Log, OSSEC Log Data, DDOS Network Traffic Data, and Malware Associated Domains List
- Security Data Formats Standards Information Including W3C, Common Event Expression, SysLog and Many Others
- Creation of an attach graph using Graphviz library
DescriptionLearn Security Visualization by Examples.
The objectives of this course include :
Going over security visualization data sources and ways of collecting data for visualization purposes;
Depicting all the popular security visualization use-cases (not just focusing network data visualization);
Teaching more than 50 display properties/types which are best associated with some specific security data or security use-cases.
At the end of this course, you will learn about :
Security Visualization Basics
Security Data Sources
Security Use-Cases
Basic Security Analyses Types
Various Display Types and Properties Which are Useful for the Visualization of Security Data
Most Useful Interaction Techniques
Technologies in a Nutshell- Quick Starter Guide and Exercises for Most Relevant Technologies
Related Academic Studies
Security Data Formats Standards Information