Chapter 11. Monitoring and Auditing

This chapter covers the following subjects:

Monitoring MethodologiesMonitoring the network is extremely important, yet often overlooked by network security administrators. In this section, you learn about the various monitoring methodologies that applications and IDS/IPS solutions use.

Using Tools to Monitor Systems and NetworksHere, we delve into the hands-on again. Included in this section are performance analysis tools such as Performance Monitor and protocol analysis tools, such as Wireshark and Network Monitor.

Conducting AuditsFull-blown audits might be performed by third-party companies, but you as the security administrator should be constantly auditing and logging the network and its hosts. ...

Get CompTIA Security+ SY0-201 Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.