Course Information
Course Overview
Learn Security Visualization by Examples- Multiple Technology Introductions for Both Visualization and Data Collection
Learn Security Visualization by Examples.
The objectives of this course include :
Going over security visualization data sources and ways of collecting data for visualization purposes;
Depicting all the popular security visualization use-cases (not just focusing network data visualization);
Teaching more than 50 display properties/types which are best associated with some specific security data or security use-cases.
At the end of this course, you will learn about :
Security Visualization Basics
Security Data Sources
Security Use-Cases
Basic Security Analyses Types
Various Display Types and Properties Which are Useful for the Visualization of Security Data
Most Useful Interaction Techniques
Technologies in a Nutshell- Quick Starter Guide and Exercises for Most Relevant Technologies
Related Academic Studies
Security Data Formats Standards Information
Course Content
- 8 section(s)
- 40 lecture(s)
- Section 1 Summary and Wrap Up
- Section 2 Introduction
- Section 3 Security Data
- Section 4 Design Process & Use-Cases
- Section 5 Visual Representation of Data
- Section 6 Interactivity
- Section 7 Conclusion
- Section 8 References
What You’ll Learn
- Security Visualization Basics, Security Data Sources, Security Use-Cases, How to Collect Data From Network, From Operating System and Other Points, Microsoft's Secret Weapon for Log Parsing for All Kind of Log Files Including Event Logs, Detailed Examination of Display Types and Properties Which Are Useful for the Visualization of Security Data, Most Useful Interaction Techniques When Dealing With Security Use-Cases, Technologies in a Nutshell- Quick Starter Guide and Exercises for Most Relevant Technologies Including TcpDump, WinDump and WireShark, Lists of Related Academic Studies and Scientific Reading Materials for Some Topics, Format and Attribute Descriptions From Security Protection Systems and Network Data, Most Useful Python Data Structures and Data Operations To Be Used When Preparing Data For Visualization, Applied Lectures to Immediately Install and Start Visualization with Python, Introduction to JavaScript Visualization Libraries for JavaScript Lovers, Downloadable Code and Exercise Files and Associated Sample Data Including Network Traffic Data, Modern Honey Network Data, IIS Log, OSSEC Log Data, DDOS Network Traffic Data, and Malware Associated Domains List, Security Data Formats Standards Information Including W3C, Common Event Expression, SysLog and Many Others, Creation of an attach graph using Graphviz library
Skills covered in this course
Reviews
-
LLalitesh Kumar
The course content was great. Although there are lots of security courses, the visualization of security is often neglected. I found the topic and content very original. I learned a lot of things. Very good tuning of different level and type of materials. I like a lot how the program is structure. Definitely recommend it if you want to upgrade your visualization and/or security knowledge.
-
JJim Waters
This a very good course on visualization for both practitioners and academics.