1 00:00:07,090 --> 00:00:11,570 - Welcome to Lesson 6, Fundamentals of Security Monitoring. 2 00:00:11,570 --> 00:00:15,730 This lesson starts by describing endpoint-based attacks 3 00:00:15,730 --> 00:00:18,780 and the concepts of data normalization. 4 00:00:18,780 --> 00:00:23,780 You will learn how to deconstruct universal data formats, 5 00:00:23,890 --> 00:00:27,490 the concept of the 5-tuple correlation, 6 00:00:27,490 --> 00:00:32,250 and how to perform intrusion analysis using DNS records. 7 00:00:32,250 --> 00:00:35,770 You will learn how to perform web log analysis, 8 00:00:35,770 --> 00:00:39,310 deterministic and probabilistic analysis, 9 00:00:39,310 --> 00:00:42,583 as well as security monitoring best practices. 10 00:00:43,520 --> 00:00:45,920 This lesson provides an overview 11 00:00:45,920 --> 00:00:48,490 of different security monitoring tools 12 00:00:48,490 --> 00:00:50,780 and different operational challenges 13 00:00:50,780 --> 00:00:53,913 in the Security Operations Center, or the SOC.