Course title

Network Metadata Log Analysis with Zeek

Use the Elastic Stack, Zeek, and Suricata to perform full-spectrum threat detection and hunting.

Course summary

In this course we will overview the features of Zeek and discuss some of the advantages of using Zeek for network security monitoring. Then we will learn how to install and configure Zeek using some best practices. Lastly, we will end the module by taking a dive into some Zeek logs to see which fields are captured for different protocols.


This course is part of the Elastic Network Security Analyst Learning Path. Please review the pre-reqs section for additional information.


Download Outline

Topics

  • Zeek overview
  • Displaying and filtering Zeek logs
  • Zeek installation and configuration

Topics

Audience

Duration

Requirements

See full, ,Network Metadata log analysis with Zeek, ,schedule

Course type

On-Demand

Course details

Language
English
Cost
$800 USD