Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Pluralsight

Detecting Anomalies and Events with Logstash

via Pluralsight

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Logstash is a powerful tool for processing and analyzing log data. In this course, you will learn the setup, configuration, and validation of Logstash in an enterprise environment.

Enterprises often struggle with effectively monitoring and detecting anomalies in their network traffic, leaving them vulnerable to potential security breaches. In this course, Detecting Anomalies and Events with Logstash, you'll learn how to utilize Logstash to secure a live enterprise environment. First, you'll discover how to set up Logstash to ingest and process network traffic data. Next, you'll apply custom filtering rules to detect anomalies in DNS, HTTP, and MySQL traffic. Finally, you'll simulate real-world traffic to test Logstash's ability to detect and flag threats. When you're finished with this course, you'll have the skills and knowledge to identify, protect, detect, and respond to threats in your network systems.

Syllabus

  • Logstash Configuration, Implementation, and Use 17mins
  • Resources 1min

Taught by

Sean Wilkins

Reviews

Start your review of Detecting Anomalies and Events with Logstash

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.