CHAPTER 12Intrusion Data Analysis
Objectives
Upon completion of this chapter, you will be able to answer the following questions:
What is the structure of alerts?
How are alerts classified?
How is data prepared for use in a network security monitoring (NSM) system?
How do you use Security Onion tools to investigate network security events?
Which network monitoring tools enhance workflow management?
What is the role of the digital forensic processes?
Key Terms
This chapter uses the following key terms. You can find the definitions in the Glossary.
Get CCNA Cybersecurity Operations Companion Guide, First Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.