|
|
Showing 1 - 3 of
3 matches in All Departments
Learn how to architect, implement, and administer a complex Splunk
Enterprise environment and extract valuable insights from business
data. Key Features Understand the various components of Splunk and
how they work together to provide a powerful Big Data analytics
solution. Collect and index data from a wide variety of common
machine data sources Design searches, reports, and dashboard
visualizations to provide business data insights Book
DescriptionSplunk is a leading platform and solution for
collecting, searching, and extracting value from ever increasing
amounts of big data - and big data is eating the world! This book
covers all the crucial Splunk topics and gives you the information
and examples to get the immediate job done. You will find enough
insights to support further research and use Splunk to suit any
business environment or situation. Splunk 7.x Quick Start Guide
gives you a thorough understanding of how Splunk works. You will
learn about all the critical tasks for architecting, implementing,
administering, and utilizing Splunk Enterprise to collect, store,
retrieve, format, analyze, and visualize machine data. You will
find step-by-step examples based on real-world experience and
practical use cases that are applicable to all Splunk environments.
There is a careful balance between adequate coverage of all the
critical topics with short but relevant deep-dives into the
configuration options and steps to carry out the day-to-day tasks
that matter. By the end of the book, you will be a confident and
proficient Splunk architect and administrator. What you will learn
Design and implement a complex Splunk Enterprise solution Configure
your Splunk environment to get machine data in and indexed Build
searches to get and format data for analysis and visualization
Build reports, dashboards, and alerts to deliver critical insights
Create knowledge objects to enhance the value of your data Install
Splunk apps to provide focused views into key technologies Monitor,
troubleshoot, and manage your Splunk environment Who this book is
forThis book is intended for experienced IT personnel who are just
getting started working with Splunk and want to quickly become
proficient with its usage. Data analysts who need to leverage
Splunk to extract critical business insights from application logs
and other machine data sources will also benefit from this book.
This book is aimed at IT professionals who want to develop or
enhance their packet analysis skills. Basic familiarity with common
network and application services terms and technologies is assumed;
however, expertise in advanced networking topics or protocols is
not required. Readers in any IT field can develop the analysis
skills specifically needed to complement and support their
respective areas of responsibility and interest.
Master Wireshark and discover how to analyze network packets and
protocols effectively, along with engaging recipes to troubleshoot
network problems About This Book * Gain valuable insights into the
network and application protocols, and the key fields in each
protocol * Use Wireshark's powerful statistical tools to analyze
your network and leverage its expert system to pinpoint network
problems * Master Wireshark and train it as your network sniffer
Who This Book Is For This book is aimed at IT professionals who
want to develop or enhance their packet analysis skills. A basic
familiarity with common network and application services terms and
technologies is assumed. What You Will Learn * Discover how packet
analysts view networks and the role of protocols at the packet
level * Capture and isolate all the right packets to perform a
thorough analysis using Wireshark's extensive capture and display
filtering capabilities * Decrypt encrypted wireless traffic * Use
Wireshark as a diagnostic tool and also for network security
analysis to keep track of malware * Find and resolve problems due
to bandwidth, throughput, and packet loss * Identify and locate
faults in communication applications including HTTP, FTP, mail, and
various other applications - Microsoft OS problems, databases,
voice, and video over IP * Identify and locate faults in detecting
security failures and security breaches in the network In Detail
This Learning Path starts off installing Wireshark, before
gradually taking you through your first packet capture, identifying
and filtering out just the packets of interest, and saving them to
a new file for later analysis. You will then discover different
ways to create and use capture and display filters. By halfway
through the book, you'll be mastering Wireshark features, analyzing
different layers of the network protocol, and looking for any
anomalies.We then start Ethernet and LAN switching, through IP, and
then move on to TCP/UDP with a focus on TCP performance problems.
It also focuses on WLAN security. Then, we go through application
behavior issues including HTTP, mail, DNS, and other common
protocols. This book finishes with a look at network forensics and
how to locate security problems that might harm the network.This
course provides you with highly practical content explaining
Metasploit from the following books: 1) Wireshark Essentials 2)
Network Analysis Using Wireshark Cookbook 3) Mastering Wireshark
Style and approach This step-by-step guide follows a practical
approach, starting from the basic to the advanced aspects. Through
a series of real-world examples, this learning path will focus on
making it easy for you to become an expert at using Wireshark.
|
You may like...
Still Life
Sarah Winman
Paperback
R365
Discovery Miles 3 650
An Island
Karen Jennings
Paperback
(1)
R280
R259
Discovery Miles 2 590
Gebeente
Etienne Van Heerden
Paperback
R399
R356
Discovery Miles 3 560
|