
Network Security Monitoring Explained (Part 1): NSM, Security Onion & Real-World Detection | Ep. 8
🚨 Episode 8 – Part 1 of 2 | Everyday Cyber Podcast
In this first part of a two-part deep dive, host Alex Reid breaks down the essentials of Network Security Monitoring (NSM) — how it works, why it matters, and the open-source tools that power real-time detection and response.
From understanding the Intrusion Kill Chain to deploying tools like Security Onion, Zeek, and Suricata, this episode helps you build foundational knowledge in modern network defense.
🔍 In this episode (Part 1):
What is NSM and how it differs from continuous monitoring
Why prevention fails — and how NSM fills the gap
Data types in NSM: full content, session, alerts, and metadata
Challenges with proxies, NAT, and the X-Forwarded-For header
Overview of open-source NSM tools (Security Onion, Bro/Zeek, Suricata, Sguil)
🧠 This episode is ideal for SOC analysts, blue teamers, cybersecurity students, and anyone learning how defenders really detect threats.
🎧 Part 2 coming next week.
network security monitoring
NSM podcast
security onion tutorial
zeek bro network analysis
suricata ids
sguil security onion
intrusion kill chain explained
network visibility tools
incident response podcast
full packet capture analysis
network forensics tools
x-forwarded-for proxy logs
nsm data types explained
cybersecurity detection stack
virus total analysis
networkminer pcap analysis
client-side compromise
server-side compromise
ioc detection process
blue team workflows
everyday cyber podcast
Information
- Show
- FrequencyUpdated daily
- Published14 July 2025 at 18:24 UTC
- Length24 min
- Season1
- Episode8
- RatingClean