Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Pluralsight

Analyze Network Event Activity Data with Elasticsearch

via Pluralsight

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
As our infrastructures grow, the quality of our data from these devices is becoming critical to cyber operations. This course will teach you how to ingest and use network event and telemetry data for threat hunting operations.

In today’s cybersecurity landscape, threats are everywhere. Our telemetry and network event data quality is important to detecting, responding to, and mitigating those threats. Elasticsearch can help ease the burden of sifting through the large amounts of data that we collect. In this course, Analyze Network Event Activity Data with Elasticsearch, you’ll learn to ingest network event and telemetry data, and use it to find threats. First, you’ll explore how to ingest security device logs and Netflow, and use it to find potential threats. Next, you’ll discover how to use application data to detect anomalies and interesting behavior. Finally, you’ll learn how to correlate the data between the various sources to identify threats. When you’re finished with this course, you’ll have the skills and knowledge of Elasticsearch needed to effectively use the data being collected for cyber operations.

Syllabus

  • Course Overview 2mins
  • Exploring Network Telemetry and Event Data 26mins
  • Analyzing Netflow with Elasticsearch 35mins
  • Using IDS Events for Threat Detection 31mins
  • Using Network Application Data for Anomaly Detection 27mins
  • Correlating Network Telemetry for Threat Detection 29mins

Taught by

Joe Abraham

Reviews

Start your review of Analyze Network Event Activity Data with Elasticsearch

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.