- ✓Network monitoring tools such as Nagios, Zabbix, and PRTG continuously check the status and performance of network devices and services.
- ✓Log management platforms aggregate logs from across the network and provide search and alerting capabilities that help identify security and performance issues.
- ✓Vulnerability scanners assess network devices and systems for known weaknesses, enabling proactive remediation before attackers can exploit them.
- ✓Intrusion detection systems alert administrators to suspicious activity patterns, while intrusion prevention systems can block threats automatically.
- ✓A Security Information and Event Management system correlates events from multiple sources to provide a comprehensive view of the security posture of the network.
Listen to the full episode inside the course. Enrol to access all 80 episodes, plus assignments, tutor support and Student Finance funding.
Start learning →Alex: Today we're looking at the tools used to manage networks, particularly from a security perspective. Sam, what are the essential tools in a network operations centre?
Sam: A network operations centre, or NOC, typically uses a stack of integrated tools. At the core is a network monitoring platform that continuously checks the status of devices, interfaces, and services and generates alerts when thresholds are exceeded or devices go offline. Above that, a log management platform aggregates and indexes logs from all devices. And for security, an SIEM platform correlates events from across the network to identify security incidents.
Alex: Let's look at network monitoring platforms. What do they do?
Sam: They poll network devices using SNMP or streaming telemetry to collect performance metrics: CPU and memory utilisation, interface traffic rates, error rates, and latency. They compare these against configured thresholds and generate alerts when metrics exceed acceptable bounds. They also maintain historical data that can be analysed to identify trends and plan capacity. Popular platforms include Nagios, Zabbix, PRTG, and SolarWinds, each with different strengths and pricing models.
Alex: What does log management add beyond monitoring?
Sam: Monitoring tells you that something is wrong right now; logs tell you what happened and in what sequence. A log management platform like Splunk, Graylog, or the Elastic Stack collects, indexes, and makes searchable the logs from all network devices, servers, and applications. When investigating a security incident or a complex network fault, being able to search through millions of log events to find the relevant ones is invaluable. Automated alerting on log patterns, like detecting multiple failed authentication attempts followed by a successful one, adds a security monitoring layer.
Alex: And vulnerability scanners?
Sam: Vulnerability scanners probe network devices and systems for known security weaknesses: unpatched software, weak configurations, open ports that shouldn't be open, and default credentials. They run either on a scheduled basis to maintain a current picture of the security posture, or as part of a more intensive security assessment. Tools like Nessus and OpenVAS generate reports listing vulnerabilities with severity ratings and recommended remediation steps. Acting on these reports is what keeps the network secure as new vulnerabilities are discovered.
Alex: And intrusion detection and prevention systems?
Sam: IDS systems monitor network traffic for patterns that match known attack signatures or that deviate from established baselines of normal behaviour. When they detect suspicious activity, they generate alerts for the security team to investigate. IPS systems go further and can automatically block traffic that matches an attack signature without waiting for human intervention. The challenge with both is managing false positives: legitimate traffic that looks suspicious, which can be disruptive if an IPS is set too aggressively.
Alex: How do all these tools work together in practice?
Sam: Integration is key. Modern network operations increasingly feeds all these tools into a centralised SIEM platform, which correlates events across monitoring, logs, and security tools to provide a unified view. When a monitoring alert coincides with suspicious log activity and a vulnerability scan finding on the same device, the SIEM can correlate these and raise a higher-priority incident than any individual source would have triggered. This integrated view is what makes modern network operations centres effective at scale.
Alex: Brilliant. Thanks Sam. We move into Unit 13: Database Management Systems next.