Pluralsight - Analyze Network Event Activity Data with Elasticsearch
File List
- 04. Using IDS Events for Threat Detection/15. Demo-Exploring Zeeks Event Data.mp4 30.1 MB
- 04. Using IDS Events for Threat Detection/16. Demo-Exploring Zeeks Event Data.mp4 29.7 MB
- 06. Correlating Network Telemetry for Threat Detection/26. Demo-Correlating Auditbeat with Network Traffic.mp4 25.8 MB
- 06. Correlating Network Telemetry for Threat Detection/27. Demo-Correlating Network Events and Telemetry.mp4 24.2 MB
- 05. Using Network Application Data for Anomaly Detection/20. Demo-Exploring Application Data.mp4 23.3 MB
- 05. Using Network Application Data for Anomaly Detection/23. Demo-Additional Threat Detection with Application Data.mp4 23.1 MB
- 04. Using IDS Events for Threat Detection/17. Demo-Identifying Adversary Techniques from IDS Telemetry.mp4 21.5 MB
- 04. Using IDS Events for Threat Detection/18. Demo-Identifying Adversary Techniques from IDS Telemetry.mp4 20.4 MB
- 03. Analyzing Netflow with Elasticsearch/12. Demo-Using NetFlow for Threat Detection.mp4 20.0 MB
- 02. Exploring Network Telemetry and Event Data/04. Demo-Exploring the Network Event Data.mp4 19.5 MB
- 03. Analyzing Netflow with Elasticsearch/11. Demo-Viewing NetFlow Visualizations in Kibana.mp4 18.4 MB
- 05. Using Network Application Data for Anomaly Detection/21. Demo-Configuring Additional Application Data Context.mp4 17.3 MB
- 02. Exploring Network Telemetry and Event Data/03. Demo-Network Technology Component Setup.mp4 16.6 MB
- 06. Correlating Network Telemetry for Threat Detection/25. Demo-Installing and Using Auditbeat.mp4 16.1 MB
- 05. Using Network Application Data for Anomaly Detection/22. Demo-Using Application Data for Threat Detection.mp4 15.6 MB
- 03. Analyzing Netflow with Elasticsearch/10. Additional NetFlow Configuration From Network Devices.mp4 14.2 MB
- 02. Exploring Network Telemetry and Event Data/05. Demo-Configuring Anomaly Detections.mp4 12.3 MB
- 02. Exploring Network Telemetry and Event Data/02. Analyze Network Event Activity Data with Elasticsearch.mp4 11.2 MB
- 02. Exploring Network Telemetry and Event Data/06. Demo-Configuring Basic Security Alerts.mp4 10.5 MB
- 03. Analyzing Netflow with Elasticsearch/08. Demo-Configuring NetFlow Collection.mp4 9.4 MB
- 03. Analyzing Netflow with Elasticsearch/09. Demo-Exporting NetFlow From Network Devices.mp4 9.1 MB
- Exercise Files.rar 8.4 MB
- 03. Analyzing Netflow with Elasticsearch/07. Discovering the Capabilities of NetFlow.mp4 6.1 MB
- 01. Course Overview/01. Course Overview.mp4 5.4 MB
- 04. Using IDS Events for Threat Detection/14. Using IDS Telemetry for Threat Hunting.mp4 5.1 MB
- 05. Using Network Application Data for Anomaly Detection/19. Discussing Application Anomalies.mp4 5.0 MB
- 06. Correlating Network Telemetry for Threat Detection/29. Additional Resources for Network Event Analysis.mp4 4.8 MB
- 06. Correlating Network Telemetry for Threat Detection/24. Discussing Event Correlation.mp4 4.3 MB
- 06. Correlating Network Telemetry for Threat Detection/28. Reviewing Network Event Analysis.mp4 4.1 MB
- 03. Analyzing Netflow with Elasticsearch/13. Using NetFlow in the Enterprise.mp4 3.1 MB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.