Pluralsight - Analyze Network Event Activity Data with Elasticsearch
    
    File List
    
        
            
                
                    - 04. Using IDS Events for Threat Detection/15. Demo-Exploring Zeeks Event Data.mp4  30.1 MB
 
                
                    - 04. Using IDS Events for Threat Detection/16. Demo-Exploring Zeeks Event Data.mp4  29.7 MB
 
                
                    - 06. Correlating Network Telemetry for Threat Detection/26. Demo-Correlating Auditbeat with Network Traffic.mp4  25.8 MB
 
                
                    - 06. Correlating Network Telemetry for Threat Detection/27. Demo-Correlating Network Events and Telemetry.mp4  24.2 MB
 
                
                    - 05. Using Network Application Data for Anomaly Detection/20. Demo-Exploring Application Data.mp4  23.3 MB
 
                
                    - 05. Using Network Application Data for Anomaly Detection/23. Demo-Additional Threat Detection with Application Data.mp4  23.1 MB
 
                
                    - 04. Using IDS Events for Threat Detection/17. Demo-Identifying Adversary Techniques from IDS Telemetry.mp4  21.5 MB
 
                
                    - 04. Using IDS Events for Threat Detection/18. Demo-Identifying Adversary Techniques from IDS Telemetry.mp4  20.4 MB
 
                
                    - 03. Analyzing Netflow with Elasticsearch/12. Demo-Using NetFlow for Threat Detection.mp4  20.0 MB
 
                
                    - 02. Exploring Network Telemetry and Event Data/04. Demo-Exploring the Network Event Data.mp4  19.5 MB
 
                
                    - 03. Analyzing Netflow with Elasticsearch/11. Demo-Viewing NetFlow Visualizations in Kibana.mp4  18.4 MB
 
                
                    - 05. Using Network Application Data for Anomaly Detection/21. Demo-Configuring Additional Application Data Context.mp4  17.3 MB
 
                
                    - 02. Exploring Network Telemetry and Event Data/03. Demo-Network Technology Component Setup.mp4  16.6 MB
 
                
                    - 06. Correlating Network Telemetry for Threat Detection/25. Demo-Installing and Using Auditbeat.mp4  16.1 MB
 
                
                    - 05. Using Network Application Data for Anomaly Detection/22. Demo-Using Application Data for Threat Detection.mp4  15.6 MB
 
                
                    - 03. Analyzing Netflow with Elasticsearch/10. Additional NetFlow Configuration From Network Devices.mp4  14.2 MB
 
                
                    - 02. Exploring Network Telemetry and Event Data/05. Demo-Configuring Anomaly Detections.mp4  12.3 MB
 
                
                    - 02. Exploring Network Telemetry and Event Data/02. Analyze Network Event Activity Data with Elasticsearch.mp4  11.2 MB
 
                
                    - 02. Exploring Network Telemetry and Event Data/06. Demo-Configuring Basic Security Alerts.mp4  10.5 MB
 
                
                    - 03. Analyzing Netflow with Elasticsearch/08. Demo-Configuring NetFlow Collection.mp4  9.4 MB
 
                
                    - 03. Analyzing Netflow with Elasticsearch/09. Demo-Exporting NetFlow From Network Devices.mp4  9.1 MB
 
                
                    - Exercise Files.rar  8.4 MB
 
                
                    - 03. Analyzing Netflow with Elasticsearch/07. Discovering the Capabilities of NetFlow.mp4  6.1 MB
 
                
                    - 01. Course Overview/01. Course Overview.mp4  5.4 MB
 
                
                    - 04. Using IDS Events for Threat Detection/14. Using IDS Telemetry for Threat Hunting.mp4  5.1 MB
 
                
                    - 05. Using Network Application Data for Anomaly Detection/19. Discussing Application Anomalies.mp4  5.0 MB
 
                
                    - 06. Correlating Network Telemetry for Threat Detection/29. Additional Resources for Network Event Analysis.mp4  4.8 MB
 
                
                    - 06. Correlating Network Telemetry for Threat Detection/24. Discussing Event Correlation.mp4  4.3 MB
 
                
                    - 06. Correlating Network Telemetry for Threat Detection/28. Reviewing Network Event Analysis.mp4  4.1 MB
 
                
                    - 03. Analyzing Netflow with Elasticsearch/13. Using NetFlow in the Enterprise.mp4  3.1 MB
 
                
            
        
     
    Download Torrent
    
    Related Resources
    
    Copyright Infringement
    
        If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.