Autoplay
Autocomplete
HTML5
Flash
Player
Speed
Previous Lecture
Complete and continue
Cisco NetFlow
Introduction
Cisco NetFlow: Introduction (1:42)
Lesson 1: Introduction to NetFlow and IPFIX
Learning objectives (0:44)
1.1 Introduction to NetFlow (4:43)
1.2 The Attack Continuum (3:30)
1.3 The Network as a Sensor and as an Enforcer (2:27)
1.4 What Is a Flow? (4:35)
1.5 NetFlow Versus IP Accounting and Billing (1:49)
1.6 NetFlow for Network Security (12:42)
1.7 Traffic Engineering and Network Planning (1:39)
1.8 Introduction to IP Flow Information Export (IPFIX) (10:24)
1.9 Cisco Supported Platforms for NetFlow (2:03)
1.10 NetFlow Versions and History (3:56)
Lesson 2: NetFlow Deployment Scenarios
Learning objectives (0:42)
2.1 Introduction to Cisco Cyber Threat Defense (8:51)
2.2 Deployment Scenario: User Access Layer (1:31)
2.3 Deployment Scenario: Wireless LAN (0:57)
2.4 Deployment Scenario: Internet Edge (1:06)
2.5 Deployment Scenario: Data Center (3:36)
2.6 Deployment Scenario: NetFlow in Site-to-Site and Remote VPNs (4:04)
2.7 NetFlow Collection Considerations and Best Practices (4:05)
2.8 Determining the Flows per Second and Scalability (2:54)
Lesson 3: Cisco Flexible NetFlow
Lesson 3: Cisco Flexible NetFlow (0:30)
3.1 Introduction to Cisco Flexible NetFlow (1:53)
3.2 Flexible NetFlow Records (2:05)
3.3 Flow Monitors, Exporters, and Samplers (3:02)
3.4 Flexible NetFlow Configuration (4:39)
3.5 Flexible NetFlow IPFIX Export Format (1:11)
Lesson 4: NetFlow Commercial and Open Source Monitoring and Analysis Software Packages
Learning objectives (0:43)
4.1 Commercial NetFlow Monitoring and Analysis Software Packages (5:54)
4.2 NFdump (4:05)
4.3 NfSen (0:37)
4.4 SiLK (4:32)
4.5 Elasticsearch, Logstash, and Kibana Stack (ELK): Overview and Architecture (4:10)
4.6 ELK: Installation and Configuration Files (8:34)
Lesson 5: Big Data Analytics and NetFlow
Learning objectives (0:44)
5.1 Introduction to Big Data Analytics for Cyber Security (2:05)
5.2 NetFlow and Other Telemetry Sources for Big Data Analytics for Cyber Security (4:31)
5.3 OpenSOC: Overview, Architecture, and Capabilities (6:36)
5.4 OpenSOC: Operation and Enrichments (6:36)
5.5 Hadoop (5:48)
5.6 Flume, Kafka, Storm, and Hive (6:58)
5.7 HBase (1:12)
5.8 Third-Party Analytic Tools and Other Big Data Software (4:01)
5.9 Understanding Big Data Scalability: Big Data Analytics in the Internet of Everything (8:29)
Lesson 6: Cisco Cyber Threat Defense and NetFlow
Learning objectives (0:41)
6.1 Cisco Cyber Threat Defense Solution: Overview (4:48)
6.2 Cisco Cyber Threat Defense Solution: AMP (2:53)
6.3 Cisco Cyber Threat Defense Solution: Threat Grid, Email Security, and Web Security (5:16)
6.4 Cisco Cyber Threat Defense Solution: ISE (4:25)
6.5 Deploying the Lancope StealthWatch System (8:54)
6.6 Deploying NetFlow Secure Event Logging in the Cisco ASA (2:18)
6.7 Deploying NSEL in Cisco ASA Configured for Clustering (4:00)
6.8 Configuring NSEL in the Cisco ASA (6:01)
6.9 Configuring NetFlow in the Cisco Nexus 1000V (4:29)
6.10 Configuring NetFlow in the Cisco Nexus 7000 Series (6:01)
Lesson 7: Troubleshooting NetFlow
Learning objectives (0:28)
7.1 Troubleshooting NetFlow in Cisco IOS and Cisco IOS XE Devices (9:03)
7.2 Troubleshooting NetFlow in Cisco NX-OS Software (2:19)
7.3 Troubleshooting NetFlow in Cisco IOS-XR Software (5:27)
7.4 Troubleshooting NetFlow in the Cisco ASA (9:38)
Lesson 8: Using NetFlow for Anomaly Detection and Identifying DoS Attacks
Learning objectives (0:32)
8.1 The Different Types of DDoS Attacks (4:40)
8.2 Using NetFlow in Enterprise Networks to Detect DDoS Attacks (3:28)
8.3 Using NetFlow in Service Provider Networks to Detect DDoS Attacks (3:48)
Lesson 9: Using NetFlow for Incident Response and Forensics
Learning objectives (0:40)
9.1 Using NetFlow for the Identification of Credit Card Theft (9:11)
9.2 Using NetFlow for the Identification of Theft of Intellectual Property (5:13)
9.3 Using NetFlow for Monitoring Guest Users and Contractors (3:02)
9.4 Using NetFlow for Capacity Planning (2:07)
9.5 Using NetFlow to Monitor Cloud Usage (1:55)
Summary
Cisco NetFlow: Summary (1:11)
Lesson 3: Cisco Flexible NetFlow
Lecture content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock