Who is using your network and how? What kind of traffic does your company generate? Where does slow network performance come from? ntop has the answers.
ntop is a network traffic probe that monitors network usage. This solution provides an intuitive, encrypted web user interface for the exploration of both real-time and historical traffic information.
In our 2-day training offering, you’ll have the opportunity to learn how you can exploit the potential of ntop.
Contents
What is ntopng
ntopng features
The ntopng architecture
Increasing packet capture speed with PF_RING and PF_RING Zero Copy
Deep Packet Inspection for identifying application protocols in network traffic
ntopng as a NetFlow/sFlow/IPFIX collector
ntopng for monitoring SNMP devices
Distributed cluster configuration and deployment
Alarm system and integration with third party software (NetEye, Slack and Mail)
Saving, exporting and consulting historical data (RRD, MySQL, Elasticsearch, Logstash, Grafana, and InfluxDB)
ntopng on Docker
Use of ntopng and example use cases
The ntopng Graphical User Interface
Analysis of historical and real-time traffic of Facebook
Troubleshooting and analysis of malware traffic (e.g., ransomware)
Monitoring of VoIP traffic (SIP and RTP)
ntopng licensing
Validity of licenses, renewals and maintenance
Community, Professional and Enterprise versions: features and functionalities
Network security with ntopng
Analysis of SSL, TCP, DNS, ARP and other protocols for the identification of anomalies and compromised hosts
Geolocation of hosts to detect traffic going towards suspicious countries and continents
Detection of exchanges of material covered by copyright
Detection and generation of alarms due to network scans and malware
Traffic characterization for applications (e.g.,Tor or BitTorrent) and content (e.g., News or ContentServer) to detect suspicious activity
ntopng demonstration and open discussion
Using ntopng in practice
Q&A
Tips & tricks
Future plans
The nBox appliance
Configuration and installation of nBox to monitor high-speed network or FB-C
Network Monitoring and passive data analysis
Over 130 different end-to-end protocols monitoring at the client level
Why you should participate
You will learn how to analyze network traffic and how to implement a security strategy by integrating ntopin NetEye
You will be updated on the latest features of the ntop next generation solution
You will enhance your skills through both practical exercises on passive network monitoring and concrete use cases of ntopng
Date and Location
11.12.2018 – 12.12.2018
The course will be held in Italian
Würth Phoenix Training Center, via Kravogl 4, 39100 Bolzano
In NetEye, 'business processes' are a module used to model and monitor the business process hierarchy to obtain a high-level view of the status of critical applications. In short, they allow monitoring controls of individual components to be aggregated into Read More
If you're working with Elastic APM, you're probably familiar with the APM Server: a component that collects telemetry data from APM Agents deployed across your infrastructure. But what happens when you need to segregate that data by tenant, especially in Read More
In the first part we created hosts and services to monitor a sequence of script using Tornado. The Tornado Rule Now let's continue with the creation of a Tornado rule: open the NetEye web interface and select Tornado dashboard, then Read More
Some time ago, my colleague Giuseppe Di Garbo published this article on the NetEye Blog, where he explained how to integrate NetEye notifications with Telegram. It was a great starting point, and in fact many of us used it to Read More
In the latest update to NetEye 4.42, we're excited to announce the introduction of support for the Content-Security-Policy (CSP) header within the Icinga Web 2 interface. This enhancement plays a crucial role in strengthening your system's defenses against cross-site scripting Read More