1 00:00:00,730 --> 00:00:06,800 Welcome to the lecture on the security of computer networks this time we will look at the issues associated 2 00:00:06,800 --> 00:00:11,000 with the administration of computer networks in particular. 3 00:00:11,120 --> 00:00:16,670 We will examine the methods of real time monitoring of packets sent over local networks and other networks 4 00:00:16,700 --> 00:00:27,640 to where we use one of the most popular network monitoring tools Wireshark. 5 00:00:27,720 --> 00:00:32,760 We will explore why automatic intrusion detection systems are not going to replace manual ways of network 6 00:00:32,760 --> 00:00:39,800 traffic analysis and this module will answer the question how to control access to the network with 7 00:00:39,800 --> 00:00:41,740 firewalls. 8 00:00:41,800 --> 00:00:46,760 We'll get to know basic information about firewalls and their division. 9 00:00:46,830 --> 00:00:51,980 We will also say a few words on network intrusion detection and the limitations of both technologies. 10 00:00:53,410 --> 00:00:58,750 Then we will examine wireshark more closely and discuss its usefulness in detecting suspicious situations 11 00:00:58,750 --> 00:01:01,900 that take place on computer networks. 12 00:01:01,910 --> 00:01:02,600 Let's start.