Professional Documents
Culture Documents
Group B
Group B
TOPICS:
GOALS AND LEARNING OBJECTIVES
SYSLOG
NETWORK MONITORING -
WIRESHARK, TCPDUMP, TSHARK, IPTABLES PART 1 AND PART 2
WIRESHARK -
FINDING MALWARE AND HACKERS PART 1 AND PART 2
NETWORK MONITORING -
WINCAP, NST, NETMINER AND NETWORX
PRESENTED BY:
GROUP B
REPORTERS:
ALLANIC, SHAYNAA LAWAS, KHENT REYNAN
BRIONES, JOHN VINCENT MANAYAGA, MARRIZ
BRUFAL, IAN VINCENT RIO, JOHN CEL
CABONADA, NINO SALMERON, JEMUEL
CRUZANA, LOVELYN SUMALINOG, ALCRIS
DECLA, JONALIE TANILON, CHARLENE
FERNANDEZ, KLAIRE ANTHONY TIGLEY, ANTONETTE
LAURON, JESSIE VERGARA, MARY GRACE
VERGARA, VINCE RADEN
GROUP B
SYSLOG:
Syslog monitoring is typically used to keep track of system and network
events, detect security threats, and troubleshoot problems.
NETWORK MONITORING -
Wireshark, tcpdump, tshark, iptables, iptables Part 1 and Part 2
NETWORK MONIITORING -
WIRESHARK