Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Analyze Network Event Activity Data with Elasticsearch

Course Cover
compare button icon

Course Features

icon

Duration

152 minutes

icon

Delivery Method

Online

icon

Available on

Downloadable Courses

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Self Paced

icon

Video Content

152 minutes

Course Description

In today's cybersecurity landscape, threats are ever-present. High-quality telemetry and network events data are crucial to detect, respond to, and mitigate these threats. Elasticsearch provides a solution to the challenge of sorting through vast amounts of data collected. The course "Analyze Network Activity Data with Elasticsearch" focuses on teaching individuals how to ingest network and telemetry data and utilize it for threat detection. The course begins by covering the ingestion of Netflow and security device logs, enabling the identification of potential threats. Additionally, participants will learn how to leverage application data for detecting anomalies and unusual behavior. Furthermore, the course emphasizes the importance of linking data from different sources to identify threats accurately. By completing this course, individuals will possess the knowledge and skills necessary to effectively utilize Elasticsearch for collecting cyber-operational data.

Course Overview

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Hands-On Training,Instructor-Moderated Discussions

Skills You Will Gain

What You Will Learn

Finally, you’ll learn how to correlate the data between the various sources to identify threats

First, you’ll explore how to ingest security device logs and Netflow, and use it to find potential threats

Learn to ingest network event and telemetry data, and use it to find threats

Next, you’ll discover how to use application data to detect anomalies and interesting behavior

When you’re finished with this course, you’ll have the skills and knowledge of Elasticsearch needed to effectively use the data being collected for cyber operations

Course Cover