What's new

Welcome to NullScriptz - NulledScriptz

Join us now to get access to all our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, and so, so much more. It's also quick and totally free, so what are you waiting for?

Share your content here:

Don't want to upload to our server on NullScriptz, Then share it now on our partner shareupld.com! Upload for free or take a subscription to be sure your files are save !

Knowledge Base

We are building our knowledge-base, find your answers! Or get directly in contact with us by creating a ticket. (In progress..)

  • We are looking for new team members ! Do you think you have it in you, to be a part of an amazing and big community, apply then below on your desired position!
    Become a Uploader! - Become a Moderator

T&M Security Event Triage Monitoring Assets and Topology


Staff member
Global Uploader
Global Moderator
Mar 30, 2016
Reaction score
Developer Skills
Xenforo: Expert
Country flag

You must be registered for see images

Security Event Triage: Monitoring Assets and Topology
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1.5 Hours | 189 MB
Genre: eLearning | Language: English

Protecting your network is now more important than ever. You can accomplish this by comparing what you know should be on the network to current network and vulnerability scans in order to identify abnormal network devices and traffic.
Being able to identify what should and what shouldn't be on your network is the first step in identifying suspicious activity on your network. In this course, Security and Event Triage: Monitoring Assets and Topology, you will learn the techniques that can help you identify potential security breaches. First, you'll learn about the importance of continuously inventorying network devices so that you know what should be on your network. Next, you'll see how to analyze network device scans and network traffic patterns to establish a baseline and to identify anomalies. Finally, you'll explore how to analyze network vulnerability scans to identify weaknesses that require attention. When you're finished with this course, you'll know how to quickly and effectively identify network anomalies.

You must be registered for see images

Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me


Latest resources

Top Bottom