O'Reilly logo

CompTIA Security+ SY0-301 Authorized Cert Guide, Deluxe Edition, Second Edition by David L. Prowse

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11. Monitoring and Auditing

This chapter covers the following subjects:

Monitoring Methodologies—Monitoring the network is extremely important, yet often overlooked by security administrators. In this section, you learn about the various monitoring methodologies that applications and IDS/IPS solutions use.

Using Tools to Monitor Systems and Networks—Here, we delve into the hands-on again. Included in this section are performance analysis tools such as Performance Monitor and protocol analysis tools, such as Wireshark and Network Monitor.

Conducting Audits—Full-blown audits might be performed by third-party companies, but you as the security administrator should be constantly auditing and logging the network and its hosts. This section ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required