How do experts monitor their networks, and keep them secure from external threats?
Discover the tools cyber security professionals use to monitor the traffic that flows through their systems. Learn about the types of real world tools they use and the techniques and concepts they employ to keep their networks secure. Learn from experts about the roles the play throughout this process.
Module | Progress | ||
---|---|---|---|
1. |
|
Setting the scene | |
2. |
|
The hacker makes a move | |
3. |
|
Attack of the hacker | |
4. |
|
The ethical hacker hacks back |
1. |
|
Setting the scene |
2. |
|
The hacker makes a move |
3. |
|
Attack of the hacker |
4. |
|
The ethical hacker hacks back |
1. |
|
Setting the scene |
2. |
|
The hacker makes a move |
3. |
|
Attack of the hacker |
4. |
|
The ethical hacker hacks back |