The Practice of Network Security Monitoring Logo

The Practice of Network Security Monitoring

0
Free
Updated 11 March 2025
Visit Website

This book teaches readers how to use network security monitoring (NSM) to add a robust layer of protection around their networks. It covers deploying, building, and running an NSM operation using open source software and vendor-neutral tools, and shows how to interpret network evidence from server-side and client-side intrusions. Readers will learn how to determine where to deploy NSM platforms, deploy stand-alone or distributed NSM installations, use command line and graphical packet analysis tools, and integrate threat intelligence into NSM software to identify sophisticated adversaries. The book provides a comprehensive guide to building a security net to detect, contain, and control attacks, and is suitable for readers with no prior experience.

FEATURES

SIMILAR TOOLS

A repository of CTF challenges and resources from various cybersecurity competitions.

Comprehensive cheat sheet for SQLite SQL injection techniques and payloads.

A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

A collection of CTF write-ups using pwntools

Deliberately vulnerable CI/CD environment with 11 challenges to practice security.

ENISA Training Resources offers online training material for cybersecurity specialists, covering technical areas such as artefact handling and analysis.

A network of physical and online cyber warfare ranges for training and testing

A cybersecurity challenge where you play the role of an incident response consultant investigating an intrusion at Precision Widgets of North Dakota.

A blog post discussing the differences between Solaris Zones, BSD Jails, VMs, and containers, with the author arguing that containers are not a real thing.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved