Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Incident Response & Threat Hunting Using Bro/Zeek Data

Course Cover
compare button icon

Course Features

icon

Duration

34 minutes

icon

Delivery Method

Online

icon

Available on

Downloadable Courses

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Self Paced

icon

Video Content

34 minutes

Course Description

Open-source Zeek's network security monitor is a valuable tool for threat hunters and incident responders. This talk will show how to use this data to reduce the time it takes to find attackers in your network. Advanced users can also use Zeek's scripting language, which allows them to create flexible, powerful detection logic that goes above traditional IDS signatures.

Course Overview

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Hands-On Training,Instructor-Moderated Discussions

Skills You Will Gain

What You Will Learn

Learn about incident response & threat hunting using bro/zeek data

Course Cover