Summary
At this point, you should be aware of the huge volumes of useful data that can be collected from the logs of various systems, as well as how to use command-line tools to "mine" this data to find information that can help you solve specific problems as they arise. The use of log alerting should also be familiar ground, allowing you to proactively send alerts in the early stages of a problem.
Then, the Dshield project was introduced. We welcome your participation, but even if you don't contribute data, it can be a valuable resource for a quick "internet weather report," as well as trends that help define the "internet climate" as far as malicious traffic (by port and protocol) goes.
You should now be familiar with how SNMP works, as well as how to use an SNMP-based NMS to manage performance metrics on your network devices and even Linux or Windows servers. We used LibreNMS in our examples, but the approaches and even the implementation...