Utilizing Zeek 4 in an Enterprise Environment or for Distributed Operations
Course Features
Duration
111 minutes
Delivery Method
Online
Available on
Downloadable Courses
Accessibility
Desktop, Laptop
Language
English
Subtitles
English
Level
Intermediate
Teaching Type
Self Paced
Video Content
111 minutes
Course Description
Course Overview
International Faculty
Post Course Interactions
Instructor-Moderated Discussions
Case Studies, Captstone Projects
Skills You Will Gain
What You Will Learn
Finally, you’ll learn how to use Zeek for Threat Hunting and Incident Response
First, you’ll explore how to design a Zeek deployment for Enterprise Monitoring
Next, you’ll discover how Zeek can support Continuous Monitoring
When you’re finished with this course, you’ll have the skills and knowledge of using Zeek to rapidly identify indicators of compromise, security control deviations, and to actively pursue adversarial threats on a network
You'll learn how to deploy this tool to support network security operations