Description
This course will teach the abilities required to build and use an open-source threat hunting security stack to analyze network and host data. A student who completes this course will be able to build the stack, add data to the stack, enhance the data with contextual information, and create dashboards to increase analytic performance and efficacy. It is not intended to replace enterprise security appliances.
What you get with this course:
- Ability to build an open-source cybersecurity/information security security stack to analyze host and network data
- Updates – This course is “living” and modules will continue to build upon each other as new software versions and technologies are created.
Course Version: 0.1 Alpha
Last Update: Jun 28, 2019
v.02 Projected Updates:
- Rebuild Images/Drawings
- Complete Case Study
Changelog:
v.01 – Release
Reviews
There are no reviews yet.