Time
7 hours 33 minutes
Difficulty
Advanced
CEU/CPE
8

Video Transcription

00:00
Hello and welcome to Sigh Berries Cup Tia Certified Van Security Practitioners Certification Preparation course.
00:10
This is a continuation of marginal manana. We're just tired of scanning in monitoring.
00:15
He had objectives which encompasses this particular martyr,
00:20
not turn out to tour. Discuss of analyzing, monitoring results.
00:25
These argan objectives. We could begin by first all discussing security analytics metrics and trends,
00:32
visualization, event data analysis and, lastly, communicating findings.
00:38
Perhaps the best place began. This particular presentation is about First are engaging in a pre assessment course tip, and the question is as follows was the technique a represent complex data in visual rather than tablet form, such as a list call is a card data visualization,
00:54
metrics, trends or security audit.
00:59
The correct response would have been data visualization.
01:03
Let's begin by. Take a look at our first agenda item, which is titled Security Analytics Metrics and Trends. When you're looking security. Security, in fact, is the first layer off a defense and depth approach. Is the enforcement off the fundamental elements of network security?
01:19
Analytics is in fact, the discovery and communication, a meaningful patterns and data
01:25
especially value in such rich areas. Recording information animates, relies on a simultaneous epic Ace of Statistics Computer Programming. Operation Research to quantify performance metrics and analysis is a a sophisticated practice in security management that takes advantage of data to produce usable,
01:45
objective information. Inside, they got decisions.
01:49
Trends is a pattern of gradual change in condition, output of process or an average or journal Tennessee of a series of data points to move in a certain direction over time. Represented by line or curve on a graph.
02:05
Visualization
02:07
is a general term that describes any effort to help people understand the significance of data by placing it in a visual context. Patterns, trends and correlation that might go undetected in a text based data can be exposed and recognize easier with data visualization software.
02:25
Other words. When it doesn't convey information through visual representation, it produces what we call interactive visual representation of abstract data to reinforce human cognition, thus enabling a view to gain knowledge about the internal structure of the data and causal relationship in it.
02:45
In terms of visualization goals, it has to answer courses because what it does force. In fact, it helps us or put us in a better position strategically to make decisions. We even see the data in the proper context. It supports the graphical calculations it finds patterns. It presents arguments on the fact that tells a story.
03:05
It can also a sw far as well,
03:07
not force. A three function of visualization, first of all, is to record other words. We want to store the information we want also have that capability zord ability to analyze other words because what ultimate is gonna do is report the reasoning about the information
03:23
communicate is not a factor again because it convey information to others.
03:29
There are number of different data visualization tools that available on the market because of what happened is these image may include interactive capabilities. We look at that a visualization and able to use and manipulate them. Drilling to the data for Korean and analysis
03:45
indicated his assigned to alert the user would win data has been updated or predefined condition Kirk and also be included.
03:52
Some of these examples again, As I mentioned here, Dion lets off some thing different types of this gonna kind of mention one here on this particular chart here. First of all, you have first card data graphics. Would you get is a fast, flexible, open source. JavaScript Charting Library that allows the user to explore interpret This data set
04:11
is highly customizable. It works in all major browsers, and you can't even pitch to zoom or mobile tablet devices as well.
04:21
Event data analysis.
04:25
If you look back at it, Miss or National Institute of Standards and Technology specific states that a law is a record of events occurring within the organization system and network logs of composed of law injuries. Each injury contains information related to a specific event as a current within your system,
04:43
for example, on his executing stabbers,
04:45
policies and procedures for long management or this also privatized Log Mansion appropriate throughout the organization or the secret and maintain a long mansion infrastructure. Or they should also provide proper support for all staff with long management type responsibilities. Or they should also
05:03
extend distended long mansion in operational processes as well.
05:09
Then we come to the topic of a packet dump
05:12
package captured in, and it is a computer network and turn for intercepting a data package that is crossing. I'm moving over. A specific computer network
05:21
wants This package is captured is stored temporarily so that could be analyzed. The packages inspected to help diagnose and soft network problems and determine whether the network security policies are being enforced
05:35
equal is important. Hackers can also use packets captain techniques to steal that has been transmitted over your network
05:44
machine data is disco information created by activism, computers, mobile phones, embedded systems and other network devices, such that it became much more prevalent as technologies such as your radio figures E identification. O R F i. D and Tele Max advance
06:00
this. Race it to the top of communicating our findings. The results of that announced can be communicated using a number of methods. The decision as to the medium or media to be used to convey the information it directly related the speed of communication. Something that fall in this criteria is when we look at the solid substance
06:19
and the question is, does the report have all the activities of findings? The attributes of the findings on the criteria
06:26
does that condition cause and effect and recommendation,
06:30
then becoming a sound logic. There's a report makes sense. Is it easy, readable,
06:35
balanced toll?
06:36
Those who report present a balanced own one that is obviously respectful
06:42
visual clarity. Doesn't report appearance. Got the reader, dude in large it off the material and last. It doesn't employ good mechanics. And the question is, does the report worst incidents it clearly and efficiently effectively communicate that message?
06:58
At this point, we have our post assessment question, and the question is as follows. What describes a pattern? A gradual change in the condition, output, all process or an average of general Tennessee of a series of data points to move in a certain direction over time is eight trends. Is it be Analects,
07:17
See metric or visualization?
07:21
The correct response would have been a trends
07:25
doing this particular presentation. We highlight the topics and, in fact, discuss Security analytics, metrics and Trends, visualization event. That analysis and lastly, communicate findings
07:38
and our upcoming presentation will conclude this particular margin by taking a look at the key takeaways, which his title scanning end monitoring look forward to see you in a very next video

Up Next

CompTIA CASP+

In this course, you will learn all of the domains and concepts associated with the CompTIA Advanced Security Practitioner CAS-003 CASP+ Exam. Through this course you will be fully prepared to sit for your CompTIA A+ Exam!

Instructed By

Instructor Profile Image
Jim Hollis
Independent Contractor
Instructor