This course will focus on the concept of monitoring network devices and traffic for security vulnerabilities, threats, and suspicious activities. It will also cover various tools including Security Information and Event Management (SIEM) used to examine patterns of attacks within a network and their proper documentation. Despite the best network defenses, it is still necessary to be able to detect if you are under attack. As most attacks follow predictable patterns, recognizing these early on may prevent further breaches. This course is designed to secure the networks and to develop a strong foundation in recognizing when a network attack is taking place and being able to contain and prevent any damage that might occur.