Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Utilizing Zeek 4 in an Enterprise Environment or for Distributed Operations

Course Cover
compare button icon

Course Features

icon

Duration

111 minutes

icon

Delivery Method

Online

icon

Available on

Downloadable Courses

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Self Paced

icon

Video Content

111 minutes

Course Description

Cybersecurity professionals are responsible for protecting networks from malicious attackers that are increasingly sophisticated and difficult to detect. This course, Utilizing Zeek 4 for Enterprise Operations or Distributed Operations, will teach you how to deploy this tool to support your network security operations. You'll first learn how to set up Zeek Enterprise Monitoring. Next, we'll show you how Zeek can be used to support Continuous Monitoring. You'll also learn how Zeek can be used for Incident Response and Threat Hunting. You will be able to use Zeek to quickly identify security control deviations and indicators of compromise and actively pursue adversarial threats to a network once you have completed this course.

Course Overview

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Instructor-Moderated Discussions

projects-img

Case Studies, Captstone Projects

Skills You Will Gain

What You Will Learn

Finally, you’ll learn how to use Zeek for Threat Hunting and Incident Response

First, you’ll explore how to design a Zeek deployment for Enterprise Monitoring

Next, you’ll discover how Zeek can support Continuous Monitoring

When you’re finished with this course, you’ll have the skills and knowledge of using Zeek to rapidly identify indicators of compromise, security control deviations, and to actively pursue adversarial threats on a network

You'll learn how to deploy this tool to support network security operations

Course Cover