Books & Videos

Table of Contents

Chapter: Introduction

Cisco NetFlow: Introduction

01m 42s

Chapter: Lesson 1: Introduction to NetFlow and IPFIX

Learning objectives

00m 44s

1.1 Introduction to NetFlow

04m 43s

1.2 The Attack Continuum

03m 30s

1.3 The Network as a Sensor and as an Enforcer

02m 27s

1.4 What Is a Flow?

04m 35s

1.5 NetFlow Versus IP Accounting and Billing

01m 50s

1.6 NetFlow for Network Security

12m 42s

1.7 Traffic Engineering and Network Planning

01m 39s

1.8 Introduction to IP Flow Information Export (IPFIX)

10m 24s

1.9 Cisco Supported Platforms for NetFlow

02m 3s

1.10 NetFlow Versions and History

03m 57s

Chapter: Lesson 2: NetFlow Deployment Scenarios

Learning objectives

00m 43s

2.1 Introduction to Cisco Cyber Threat Defense

08m 51s

2.2 Deployment Scenario: User Access Layer

01m 31s

2.3 Deployment Scenario: Wireless LAN

00m 57s

2.4 Deployment Scenario: Internet Edge

01m 6s

2.5 Deployment Scenario: Data Center

03m 36s

2.6 Deployment Scenario: NetFlow in Site-to-Site and Remote VPNs

04m 4s

2.7 NetFlow Collection Considerations and Best Practices

04m 6s

2.8 Determining the Flows per Second and Scalability

02m 54s

Chapter: Lesson 3: Cisco Flexible NetFlow

Learning objectives

00m 30s

3.1 Introduction to Cisco Flexible NetFlow

01m 54s

3.2 Flexible NetFlow Records

02m 5s

3.3 Flow Monitors, Exporters, and Samplers

03m 2s

3.4 Flexible NetFlow Configuration

04m 40s

3.5 Flexible NetFlow IPFIX Export Format

01m 11s

Chapter: Lesson 4: NetFlow Commercial and Open Source Monitoring and Analysis Software Packages

Learning objectives

00m 43s

4.1 Commercial NetFlow Monitoring and Analysis Software Packages

05m 54s

4.2 NFdump

04m 5s

4.3 NfSen

00m 38s

4.4 SiLK

04m 32s

4.5 Elasticsearch, Logstash, and Kibana Stack (ELK): Overview and Architecture

04m 10s

4.6 ELK: Installation and Configuration Files

08m 34s

Chapter: Lesson 5: Big Data Analytics and NetFlow

Learning objectives

00m 44s

5.1 Introduction to Big Data Analytics for Cyber Security

02m 6s

5.2 NetFlow and Other Telemetry Sources for Big Data Analytics for Cyber Security

04m 31s

5.3 OpenSOC: Overview, Architecture, and Capabilities

06m 36s

5.4 OpenSOC: Operation and Enrichments

06m 36s

5.5 Hadoop

05m 48s

5.6 Flume, Kafka, Storm, and Hive

06m 58s

5.7 HBase

01m 12s

5.8 Third-Party Analytic Tools and Other Big Data Software

04m 1s

5.9 Understanding Big Data Scalability: Big Data Analytics in the Internet of Everything

08m 30s

Chapter: Lesson 6: Cisco Cyber Threat Defense and NetFlow

Learning objectives

00m 41s

6.1 Cisco Cyber Threat Defense Solution: Overview

04m 48s

6.2 Cisco Cyber Threat Defense Solution: AMP

02m 53s

6.3 Cisco Cyber Threat Defense Solution: Threat Grid, Email Security, and Web Security

05m 16s

6.4 Cisco Cyber Threat Defense Solution: ISE

04m 25s

6.5 Deploying the Lancope StealthWatch System

08m 54s

6.6 Deploying NetFlow Secure Event Logging in the Cisco ASA

02m 18s

6.7 Deploying NSEL in Cisco ASA Configured for Clustering

04m 0s

6.8 Configuring NSEL in the Cisco ASA

06m 1s

6.9 Configuring NetFlow in the Cisco Nexus 1000V

04m 29s

6.10 Configuring NetFlow in the Cisco Nexus 7000 Series

06m 1s

Chapter: Lesson 7: Troubleshooting NetFlow

Learning objectives

00m 28s

7.1 Troubleshooting NetFlow in Cisco IOS and Cisco IOS XE Devices

09m 3s

7.2 Troubleshooting NetFlow in Cisco NX-OS Software

02m 19s

7.3 Troubleshooting NetFlow in Cisco IOS-XR Software

05m 27s

7.4 Troubleshooting NetFlow in the Cisco ASA

09m 38s

Chapter: Lesson 8: Using NetFlow for Anomaly Detection and Identifying DoS Attacks

Learning objectives

00m 33s

8.1 The Different Types of DDoS Attacks

04m 40s

8.2 Using NetFlow in Enterprise Networks to Detect DDoS Attacks

03m 28s

8.3 Using NetFlow in Service Provider Networks to Detect DDoS Attacks

03m 48s

Chapter: Lesson 9: Using NetFlow for Incident Response and Forensics

Learning objectives

00m 41s

9.1 Using NetFlow for the Identification of Credit Card Theft

09m 11s

9.2 Using NetFlow for the Identification of Theft of Intellectual Property

05m 14s

9.3 Using NetFlow for Monitoring Guest Users and Contractors

03m 2s

9.4 Using NetFlow for Capacity Planning

02m 7s

9.5 Using NetFlow to Monitor Cloud Usage

01m 55s

Chapter: Summary

Cisco NetFlow: Summary

01m 11s