Compare cert salaries and plan your next career move
docrice wrote: » I think this really depends on what you're trying to accomplish. Do you want to see how a device handles a load of TCP traffic? UDP? Odd protocols? Weird payloads? Non-RFC complaint traffic? Malicious traffic? Digital bombs? Glowing packets with lightsaber energy in the payload? Interesting you bring this up because I will need to actually do this fairly soon. One tool that I've heard of:Inverse Path - Research
These days modern information security requires far more than just log and event data - it requires the ability to collect and analyze ALL network security data, in real-time. SIEM leaves a legacy on which information security can build. There will be a collection - all security data is welcomed.
Compare salaries for top cybersecurity certifications. Free download for TechExams community.