Inhalt: Today, when you make a call, you are most likely using Voice over IP (VoIP). VoIP uses the existing internet and network to transfer and route voice traffic in IP packets. In many cases, it is a part of a Unified Communications (UC) system, which integrates VoIP, video, email, and instant messaging into one seamless business application. In this course, learn about UC and its many layers so you can integrate UC and VoIP into your business network. Instructor Lisa Bock compares the traditional Public Switched Telephone Network (PSTN) to VoIP and discusses the components necessary for VoIP to be possible. Lisa reviews digital codecs, protocols for data transport, and intermediary systems such as translators and mixers. Lisa then reviews business integration and the importance of conducting a network assessment prior to implementation. Lisa wraps up with a discussion on how ensuring quality of service (QoS) in a VoIP network minimizes latency and jitter and the importance of VoIP security. Umfang: 01:08:59.00
Inhalt: The Internet of Things (IoT) is how devices on the Internet communicate through omnipresent sensors. Since its inception, consumers have connected smart devices to the network at an exponential rate, bringing us closer to a future where everyday things all interconnect. In this course-the first in a series that focuses on securing the Internet of Things-you can get started with this essential concept. Lisa Bock kicks off the course with an overview of IoT, and the types of IoT devices designed to improve the quality of life in homes and businesses. Lisa covers different networks that range in size and purpose-LANS, WANS and PANS-and explains how businesses invest heavily in IoT in order to keep a competitive edge, going into IoT developments in automobiles, building automation, and the medical field. She then evaluates consumer devices, such as wearables and mobile devices. Plus, she discusses zero-configuration networking, service discovery, designing IoT security, and more. Umfang: 01:29:51.00
Inhalt: The rapid expansion of IoT technology brings with it an array of exciting and imaginative ways to make our products smarter and our lives easier. But the growth of this emerging technology also brings with it huge gaps in security. The IoT is plagued with vulnerabilities, malware, DDoS attacks, and the potential to disrupt infrastructure. In this course, join Lisa Bock as she explores the relationship between security, privacy, and the IoT. Lisa discusses how the vulnerabilities in IoT devices have the potential to compromise user privacy and make them more susceptible to attacks and glitches. In addition, she discusses IoT privacy concerns; existing standards, regulations, and guidelines, such as HIPAA and Sarbanes-Oxley; and proposed standards and legislation that are currently in the works to ensure the privacy of the data collected on the IoT. Umfang: 01:54:59.00
Inhalt: Learn how to capture and analyze network traffic with Wireshark, a free, open-source packet analysis tool, and identify congestion issues, suspicious activity, and network intrusions. In this course, Lisa Bock reviews the fundamental concepts underlying Wireshark, such as network analysis and the OSI model, and examines some example packet captures so you can start to understand field values and compare normal to abnormal network behaviors. You'll also be introduced to common attack signatures, display and capture filters, and protocols such as HTTP, TCP, DNS, and FTP. Umfang: 02:35:54.00
Inhalt: Wireshark Essential Training provides a solid overview of deep packet inspection by stepping through the basics of packet capture and analysis using Wireshark. In this course, Lisa Bock helps you understand the field values of the protocols and what's considered normal behavior using precaptured packets from online repositories. Lisa helps you navigate through the many features of Wireshark. She begins by stressing the benefits of traffic analysis and discussing how this powerful tool can be used to examine traffic either live from wired or wireless connections. She compares the legacy and next generation versions of Wireshark, demonstrates how to install this tool on a PC and on a Mac, and explores the Wireshark interface. She then moves into deep packet analysis of common protocols such as TCP, IP, DHCP, and DNS. To wrap up, she summarizes working with packet captures, discusses the Wireshark expert system, and goes over how Wireshark can help detect network latency issues. She also illustrates ways to subset traffic and then share captures using CloudShark. Lisa walks participants through the basics, so no previous experience with Wireshark is necessary. Umfang: 02:25:06.00
Inhalt: Enhance your Wireshark skillset by picking up some more sophisticated tools and techniques. In this course, instructor Lisa Bock takes a deep dive into advanced topics such as tapping into the stream, merging and sanitizing packet captures, capture engines, optimizing packet capture, and IO and stream graphs. Lisa begins with a review of network architecture. She covers ways to solve network problems, merge traffic, and sanitize captures before sharing, along with capturing session keys to decrypt traffic. She then reviews capture engines along with a discussion on wireless traffic. She reviews CLI capture-a more lightweight option that's not resource intensive-and goes over IO graphs and TCP stream graphs, which can provide you with a closer look at traffic trends and round-trip time. Umfang: 01:49:03.00
Inhalt: Speed up your workflow and enhance your analysis by becoming better acquainted with the Wireshark interface and its core features. In this course, join Lisa Bock as she helps to familiarize you with this powerful protocol analysis tool. Lisa reviews the menu choices, explains each of the toolbars available, and shares tips for modifying the Wireshark interface to suit your needs. Discover capture options and understand the difference between capture and display filters. Learn how to efficiently find and mark packets, and fine-tune columns, fonts, and colors. Create configuration protocols and easily add comments to a single packet or to the entire capture, all with the goal of helping you navigate easier in Wireshark. Umfang: 01:41:44.00
Inhalt: Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic. Umfang: 01:52:49.00
Inhalt: Learn how to analyze network problems with Wireshark, a free, open-source packet analysis tool used by network administrators around the world. In this course, Lisa Bock demonstrates how to get the most out of Wireshark, so that you can better evaluate your network and keep traffic moving. You can discover how to use time as a metric for visualizing delays. In addition, you can get an introduction to some of the most helpful tools within Wireshark, such as TCP, I/O, and flow graphs. Finally, learn how to visualize transmission errors and recognize common attack signatures. Umfang: 01:30:35
Inhalt: Learn how to use Wireshark, the powerful protocol analysis tool, to deal with packet loss and recovery, so you can keep traffic moving. Instructor Lisa Bock begins by reviewing normal traffic, comparing TCP, a connection-oriented protocol, with UDP, a lightweight connectionless protocol. She then moves into discussing network latency, packet loss, and throughput; TCP and UDP packet loss recovery; misconfiguration issues that can cause an interruption of end user experience, along with malware; and more. Umfang: 01:23:09.00
Inhalt: Voice over IP (VoIP) is a technology that sends voice data in packets using the IP network-allowing you to make calls using an internet connection instead of a traditional phone line. In this course, join Lisa Bock as she takes an in-depth look at VoIP protocols and components, as well as how to troubleshoot VoIP calls. Lisa begins with an overview of VoIP, discussing its uses, codecs, and components. She then reviews the protocols that make VoIP possible, including TCP/IP, Skinny Client Control Protocol (SCCP) and the H.323 family. She provides a review of media gateways and network operations, including quality of service and DNS, that are critical to the success of VoIP. To wrap up, Lisa dives into Wireshark statistics, showing how to leverage these statistics to troubleshoot VoIP. Umfang: 01:42:23.00
Programm Findus Internet-OPAC findus.pl V20.236/8 auf Server windhund2.findus-internet-opac.de,
letztes Datenbankupdate: 17.05.2024, 12:10 Uhr. 2.922 Zugriffe im Mai 2024. Insgesamt 513.152 Zugriffe seit Januar 2009
Mobil - Impressum - Datenschutz - CO2-Neutral