Who is using your network and how? What kind of traffic does your company generate? Where does slow network performance come from? ntop has the answers.
ntop is a network traffic probe that monitors network usage. This solution provides an intuitive, encrypted web user interface for the exploration of both real-time and historical traffic information.
In our 2-day training offering, you’ll have the opportunity to learn how you can exploit the potential of ntop.
Contents
What is ntopng
ntopng features
The ntopng architecture
Increasing packet capture speed with PF_RING and PF_RING Zero Copy
Deep Packet Inspection for identifying application protocols in network traffic
ntopng as a NetFlow/sFlow/IPFIX collector
ntopng for monitoring SNMP devices
Distributed cluster configuration and deployment
Alarm system and integration with third party software (NetEye, Slack and Mail)
Saving, exporting and consulting historical data (RRD, MySQL, Elasticsearch, Logstash, Grafana, and InfluxDB)
ntopng on Docker
Use of ntopng and example use cases
The ntopng Graphical User Interface
Analysis of historical and real-time traffic of Facebook
Troubleshooting and analysis of malware traffic (e.g., ransomware)
Monitoring of VoIP traffic (SIP and RTP)
ntopng licensing
Validity of licenses, renewals and maintenance
Community, Professional and Enterprise versions: features and functionalities
Network security with ntopng
Analysis of SSL, TCP, DNS, ARP and other protocols for the identification of anomalies and compromised hosts
Geolocation of hosts to detect traffic going towards suspicious countries and continents
Detection of exchanges of material covered by copyright
Detection and generation of alarms due to network scans and malware
Traffic characterization for applications (e.g.,Tor or BitTorrent) and content (e.g., News or ContentServer) to detect suspicious activity
ntopng demonstration and open discussion
Using ntopng in practice
Q&A
Tips & tricks
Future plans
The nBox appliance
Configuration and installation of nBox to monitor high-speed network or FB-C
Network Monitoring and passive data analysis
Over 130 different end-to-end protocols monitoring at the client level
Why you should participate
You will learn how to analyze network traffic and how to implement a security strategy by integrating ntopin NetEye
You will be updated on the latest features of the ntop next generation solution
You will enhance your skills through both practical exercises on passive network monitoring and concrete use cases of ntopng
Date and Location
11.12.2018 – 12.12.2018
The course will be held in Italian
Würth Phoenix Training Center, via Kravogl 4, 39100 Bolzano
In the first part of this series, we explored how Jira Service Management (JSM) helps streamline Incident Management, aligning with ITIL v4 best practices. Incident Management aims to restore normal service operation as quickly as possible after a disruption, ensuring Read More
Hello everyone! Today, I'd like to briefly discuss an improvement to the update and upgrade procedures that we've started to adopt with NetEye 4.39! What we wanted to improve One aspect that made quite an impact was that whenever the Read More
Hello everyone! Today, I’d like to share an exciting improvement we’ve made to the installation and upgrade procedures in NetEye, introducing a faster and more efficient parallel architecture! Why Modernize the Installation and Upgrade Processes? At Würth Phoenix, we strive Read More
Note: This description of a security analyst's daily routine is fictitious. However, the osquery examples have been tested and can therefore be used as a template for your own research. 1. Alarm Detection Today started with a high-severity alarm from our Read More
Scenario NetEye 4 provides a graphical engine to represent time series monitoring data stored in an Influx database: the Grafana engine accessible through the ITOA menu on the left hand side. Grafana is very powerful: it consists of a dashboard Read More