Monitoring & Securing Networks

Course badge for Monitoring & Securing Networks

How do experts monitor their networks, and keep them secure from external threats?

Discover the tools cyber security professionals use to monitor the traffic that flows through their systems. Learn about the types of real world tools they use and the techniques and concepts they employ to keep their networks secure. Learn from experts about the roles the play throughout this process.

Please log in or register to access this course.

This course is free for Australian and Aotearoa New Zealand users.

Module Progress
1.
Setting the scene
2.
The hacker makes a move
3.
Attack of the hacker
4.
The ethical hacker hacks back
1.
Setting the scene
2.
The hacker makes a move
3.
Attack of the hacker
4.
The ethical hacker hacks back
1.
Setting the scene
2.
The hacker makes a move
3.
Attack of the hacker
4.
The ethical hacker hacks back