ELK for Security Analysis | Networkdefense


ELK for Security Analysis | Networkdefense
English | Size: 2.01 GB
Genre: eLearning

ELK is Elasticsearch, Logstash, and Kibana and together they provide a framework for collecting, storing, and investigating network security data. In this course, you’ll learn how to use this powerful trio to perform security analysis. This isn’t just an ELK course; it’s a course on how to use ELK specifically for incident responders, network security monitoring analysts, and other security blue teamers.

You’ll learn the basics of:

Elasticsearch: How data is stored and indexed. Working with JSON documents.
Logstash: How to collect and manipulate structured and unstructured data.
Kibana: Techniques for searching data and building useful visualizations and dashboards.
Beats: Use the agent to ship data from endpoints and servers to your ELK systems.
I’ll show you how to build complete data pipelines from ingest to search.
This means you’ll get to watch step-by-step guides for dealing with security specific data types like:

HTTP Proxy Logs
File-Based Logs (Unix, auth, and application logs)
Windows Events & Sysmon Data
NetFlow Data
IDS Alerts
Dealing with any CSV file you’re handed
Parsing unstructured logs, no matter how weird they are
When you walk away from this course, you should be equipped with the skills you need to build a complete IDS alert console, investigation platform, or security analysis lab.

nitroflare.com/view/A02C283A261B6E7/ELK-for-Security-Analysis.6.4.part01.rar
nitroflare.com/view/C847ACC333549F4/ELK-for-Security-Analysis.6.4.part02.rar
nitroflare.com/view/CD6D9931388D052/ELK-for-Security-Analysis.6.4.part03.rar
nitroflare.com/view/A7BEA686C3F3970/ELK-for-Security-Analysis.6.4.part04.rar
nitroflare.com/view/02A869C6A3894A6/ELK-for-Security-Analysis.6.4.part05.rar
nitroflare.com/view/078DB3887F1DB02/ELK-for-Security-Analysis.6.4.part06.rar
nitroflare.com/view/9AA45DCDF69B988/ELK-for-Security-Analysis.6.4.part07.rar
nitroflare.com/view/4C45F6D1D996699/ELK-for-Security-Analysis.6.4.part08.rar
nitroflare.com/view/9812C036C4C2F7B/ELK-for-Security-Analysis.6.4.part09.rar

rapidgator.net/file/68650e6efe0e0ed80611354b17195f6d/ELK-for-Security-Analysis.6.4.part01.rar.html
rapidgator.net/file/58f6e57fd371b35f7aebd73c7eec700e/ELK-for-Security-Analysis.6.4.part02.rar.html
rapidgator.net/file/39094f2385ff7ae723e4d5779583ffb9/ELK-for-Security-Analysis.6.4.part03.rar.html
rapidgator.net/file/93fa2ef05551da1028edf119c97bb31e/ELK-for-Security-Analysis.6.4.part04.rar.html
rapidgator.net/file/05e7647861a466b1ddd23ca672886a83/ELK-for-Security-Analysis.6.4.part05.rar.html
rapidgator.net/file/763abe268934bcec8c91f4b7272974ba/ELK-for-Security-Analysis.6.4.part06.rar.html
rapidgator.net/file/3e28e78db26bd6878a4ff5148dc7a21b/ELK-for-Security-Analysis.6.4.part07.rar.html
rapidgator.net/file/a18c9b9b1d1e78164b033a179c42b9fa/ELK-for-Security-Analysis.6.4.part08.rar.html
rapidgator.net/file/2d0b84ea1ae1097c4454264b9279f94e/ELK-for-Security-Analysis.6.4.part09.rar.html

If any links die or problem unrar, send request to
forms.gle/e557HbjJ5vatekDV9

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.