Basics of Network Traffic Analysis | TryHackMe Traffic Analysis Essentials
๐ Cyber Security Certification Notes & Cheat Sheets https://buymeacoffee.com/notescatalog/extras ๐(2nd link) Cyber Security Certification Notes & Cheat She...

Motasem Hamdan
22.7K views โข Dec 2, 2022

About this video
๐ Cyber Security Certification Notes & Cheat Sheets
https://buymeacoffee.com/notescatalog/extras
๐(2nd link) Cyber Security Certification Notes & Cheat Sheets
https://shop.motasem-notes.net/collections/cyber-security-study-notes
๐กCyber Security Notes | Membership Access
https://buymeacoffee.com/notescatalog/membership
๐งฉCybersecurity Direct Coaching & Mentoring
https://shop.motasem-notes.net/collections/coaching-and-mentoring-programs
๐ฅDownload FREE Cyber Security 101 Study Notes
https://buymeacoffee.com/notescatalog/e/290985
๐ง Get Strategic cyber security and tech insights weekly to your email by joining my newsletter below
https://buymeacoffee.com/notescatalog/membership
๐Blog Writeups
https://www.motasem-notes.net
***
In this video walk-through, we covered network traffic analysis essentials for the purpose of incident response and network troubleshooting.
*************
TryHackMe Traffic Analysis Essentials
https://tryhackme.com/r/room/trafficanalysisessentials
Writeup
https://motasem-notes.net/en/basics-of-network-traffic-analysis-tryhackme-traffic-analysis-essentials/
********
Store
https://buymeacoffee.com/notescatalog/extras
Patreon
https://www.patreon.com/motasemhamdan
Instagram
https://www.instagram.com/motasem.hamdan.tech/
Google Profile
https://maps.app.goo.gl/eLotQQb7Dm6aiL8z6
LinkedIn
[1]: https://www.linkedin.com/in/motasem-hamdan-7673289b/
[2]: https://www.linkedin.com/in/motasem-eldad-ha-bb42481b2/
Instagram
https://www.instagram.com/mastermindstudynotes/
Twitter
https://twitter.com/ManMotasem
Facebook
https://www.facebook.com/motasemhamdantty/
****
0:00 - Introduction to Traffic Analysis Essentials
0:10 - Defining Traffic Analysis and Its Purpose
0:29 - Key Purposes of Traffic Analysis: Incident Response and Troubleshooting
1:30 - Traffic Analysis in Network Security and Network Engineering
2:00 - Overview of Network Sniffing and Monitoring
3:00 - Introduction to Intrusion Detection and Response
3:45 - Role of Traffic Analysis in Network Forensics
4:30 - Two Main Techniques in Traffic Analysis: Flow and Packet Analysis
5:30 - Flow Analysis: Gathering Network Statistics from Devices
6:50 - Packet Analysis: Detailed Analysis of Network Logs
8:00 - Recap of Traffic Analysis Objectives
8:50 - Example Challenge on TryHackMe: Simulating Traffic Analysis
9:30 - Identifying Malicious Traffic from Network Devices
10:45 - Analyzing Traffic Logs and Identifying Threats
12:30 - Filtering Malicious IP Addresses in the Firewall
14:00 - Monitoring Results and Confirming Traffic Block
14:30 - Identifying and Blocking Malicious Ports
16:00 - Blocking Destination Ports Based on Traffic Analysis
17:10 - Final Thoughts and Conclusion
https://buymeacoffee.com/notescatalog/extras
๐(2nd link) Cyber Security Certification Notes & Cheat Sheets
https://shop.motasem-notes.net/collections/cyber-security-study-notes
๐กCyber Security Notes | Membership Access
https://buymeacoffee.com/notescatalog/membership
๐งฉCybersecurity Direct Coaching & Mentoring
https://shop.motasem-notes.net/collections/coaching-and-mentoring-programs
๐ฅDownload FREE Cyber Security 101 Study Notes
https://buymeacoffee.com/notescatalog/e/290985
๐ง Get Strategic cyber security and tech insights weekly to your email by joining my newsletter below
https://buymeacoffee.com/notescatalog/membership
๐Blog Writeups
https://www.motasem-notes.net
***
In this video walk-through, we covered network traffic analysis essentials for the purpose of incident response and network troubleshooting.
*************
TryHackMe Traffic Analysis Essentials
https://tryhackme.com/r/room/trafficanalysisessentials
Writeup
https://motasem-notes.net/en/basics-of-network-traffic-analysis-tryhackme-traffic-analysis-essentials/
********
Store
https://buymeacoffee.com/notescatalog/extras
Patreon
https://www.patreon.com/motasemhamdan
https://www.instagram.com/motasem.hamdan.tech/
Google Profile
https://maps.app.goo.gl/eLotQQb7Dm6aiL8z6
[1]: https://www.linkedin.com/in/motasem-hamdan-7673289b/
[2]: https://www.linkedin.com/in/motasem-eldad-ha-bb42481b2/
https://www.instagram.com/mastermindstudynotes/
https://twitter.com/ManMotasem
https://www.facebook.com/motasemhamdantty/
****
0:00 - Introduction to Traffic Analysis Essentials
0:10 - Defining Traffic Analysis and Its Purpose
0:29 - Key Purposes of Traffic Analysis: Incident Response and Troubleshooting
1:30 - Traffic Analysis in Network Security and Network Engineering
2:00 - Overview of Network Sniffing and Monitoring
3:00 - Introduction to Intrusion Detection and Response
3:45 - Role of Traffic Analysis in Network Forensics
4:30 - Two Main Techniques in Traffic Analysis: Flow and Packet Analysis
5:30 - Flow Analysis: Gathering Network Statistics from Devices
6:50 - Packet Analysis: Detailed Analysis of Network Logs
8:00 - Recap of Traffic Analysis Objectives
8:50 - Example Challenge on TryHackMe: Simulating Traffic Analysis
9:30 - Identifying Malicious Traffic from Network Devices
10:45 - Analyzing Traffic Logs and Identifying Threats
12:30 - Filtering Malicious IP Addresses in the Firewall
14:00 - Monitoring Results and Confirming Traffic Block
14:30 - Identifying and Blocking Malicious Ports
16:00 - Blocking Destination Ports Based on Traffic Analysis
17:10 - Final Thoughts and Conclusion
Video Information
Views
22.7K
Likes
361
Duration
18:05
Published
Dec 2, 2022
User Reviews
4.6
(4) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now