From the course: Cisco Certified CyberOps Associate (200-201) Cert Prep: 1 Security Concepts
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Using agentless or agent-based methods
From the course: Cisco Certified CyberOps Associate (200-201) Cert Prep: 1 Security Concepts
Using agentless or agent-based methods
- [Narrator] It's important to monitor our systems in either conventional or virtualized environments. One method we use to assess the health of our systems is by using agentless and agent-based approaches. The goal is to monitor the health and status of each device on the network. Although the two have a similar purpose, they have different ways to achieve the same goal. Let's compare the two. With agent-based monitoring, an agent must be installed into each monitored node. Once installed, you can collect, analyze, and process significantly more data from a given system. This method uses less bandwidth as data is collected locally and processed before sending across the network to a central server. Agent-based monitoring is more secure as data is handled locally and no additional firewall rules are required. This method is more reliable as the agent can store monitored logs even when the network connection is lost.…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
(Locked)
Identifying challenges of data visibility2m 25s
-
(Locked)
Comparing security deployments2m 37s
-
(Locked)
Using agentless or agent-based methods2m 54s
-
(Locked)
Utilizing SIEM, SOAR, and log management3m 12s
-
(Locked)
Employing runbook automation3m 53s
-
(Locked)
Exploring Nmap4m 12s
-
(Locked)
Challenge: Using Nmap2m 57s
-
(Locked)
Solution: Using Nmap5m 29s
-
(Locked)
-