Who is using your network and how? What kind of traffic does your company generate? Where does slow network performance come from? ntop has the answers.
ntop is a network traffic probe that monitors network usage. This solution provides an intuitive, encrypted web user interface for the exploration of both real-time and historical traffic information.
In our 2-day training offering, you’ll have the opportunity to learn how you can exploit the potential of ntop.
Contents
What is ntopng
ntopng features
The ntopng architecture
Increasing packet capture speed with PF_RING and PF_RING Zero Copy
Deep Packet Inspection for identifying application protocols in network traffic
ntopng as a NetFlow/sFlow/IPFIX collector
ntopng for monitoring SNMP devices
Distributed cluster configuration and deployment
Alarm system and integration with third party software (NetEye, Slack and Mail)
Saving, exporting and consulting historical data (RRD, MySQL, Elasticsearch, Logstash, Grafana, and InfluxDB)
ntopng on Docker
Use of ntopng and example use cases
The ntopng Graphical User Interface
Analysis of historical and real-time traffic of Facebook
Troubleshooting and analysis of malware traffic (e.g., ransomware)
Monitoring of VoIP traffic (SIP and RTP)
ntopng licensing
Validity of licenses, renewals and maintenance
Community, Professional and Enterprise versions: features and functionalities
Network security with ntopng
Analysis of SSL, TCP, DNS, ARP and other protocols for the identification of anomalies and compromised hosts
Geolocation of hosts to detect traffic going towards suspicious countries and continents
Detection of exchanges of material covered by copyright
Detection and generation of alarms due to network scans and malware
Traffic characterization for applications (e.g.,Tor or BitTorrent) and content (e.g., News or ContentServer) to detect suspicious activity
ntopng demonstration and open discussion
Using ntopng in practice
Q&A
Tips & tricks
Future plans
The nBox appliance
Configuration and installation of nBox to monitor high-speed network or FB-C
Network Monitoring and passive data analysis
Over 130 different end-to-end protocols monitoring at the client level
Why you should participate
You will learn how to analyze network traffic and how to implement a security strategy by integrating ntopin NetEye
You will be updated on the latest features of the ntop next generation solution
You will enhance your skills through both practical exercises on passive network monitoring and concrete use cases of ntopng
Date and Location
11.12.2018 – 12.12.2018
The course will be held in Italian
Würth Phoenix Training Center, via Kravogl 4, 39100 Bolzano
As technology continually evolves, keeping our software stack up to date is essential for performance, security, and access to new functionalities. In this post, I want to share how we upgraded MariaDB from version 10.3 to 10.11 as part of Read More
In some test or development environments, you may need to simulate the presence of GSM modems without having an actual physical device. This can be useful for example when testing monitoring checks, SMS management systems, or creating new notification rules. Read More
Just like last year, we had the wonderful opportunity to attend FOSDEM, the most important open source conference in Europe. This year was no exception, and among the many exciting talks, one that particularly caught my attention was Alex Stefanini’s Read More
When designing an Elasticsearch architecture, choosing the right storage is crucial. While NFS might seem like a convenient and flexible option, it comes with several pitfalls when used for hosting live Elasticsearch data (hot, warm, cold, and frozen nodes). However, Read More
When using Kibana in environments that require a proxy to reach external services, you might encounter issues with unrecognized SSL certificates. Specifically, if the proxy is exposed with its own certificate and acts as an SSL terminator, requests made by Read More