TorBT - Torrents and Magnet Links Search Engine
Pluralsight - Analyze Network Event Activity Data with Elasticsearch
- Date: 2025-07-18
- Size: 435 MB
- Files: 30
File Name
Size
04. Using IDS Events for Threat Detection/15. Demo-Exploring Zeeks Event Data.mp4
30 MB
01. Course Overview/01. Course Overview.mp4
5.4 MB
02. Exploring Network Telemetry and Event Data/02. Analyze Network Event Activity Data with Elasticsearch.mp4
11 MB
02. Exploring Network Telemetry and Event Data/03. Demo-Network Technology Component Setup.mp4
17 MB
02. Exploring Network Telemetry and Event Data/04. Demo-Exploring the Network Event Data.mp4
20 MB
02. Exploring Network Telemetry and Event Data/05. Demo-Configuring Anomaly Detections.mp4
12 MB
02. Exploring Network Telemetry and Event Data/06. Demo-Configuring Basic Security Alerts.mp4
10 MB
03. Analyzing Netflow with Elasticsearch/07. Discovering the Capabilities of NetFlow.mp4
6.1 MB
03. Analyzing Netflow with Elasticsearch/08. Demo-Configuring NetFlow Collection.mp4
9.4 MB
03. Analyzing Netflow with Elasticsearch/09. Demo-Exporting NetFlow From Network Devices.mp4
9.1 MB
03. Analyzing Netflow with Elasticsearch/10. Additional NetFlow Configuration From Network Devices.mp4
14 MB
03. Analyzing Netflow with Elasticsearch/11. Demo-Viewing NetFlow Visualizations in Kibana.mp4
18 MB
03. Analyzing Netflow with Elasticsearch/12. Demo-Using NetFlow for Threat Detection.mp4
20 MB
03. Analyzing Netflow with Elasticsearch/13. Using NetFlow in the Enterprise.mp4
3.1 MB
04. Using IDS Events for Threat Detection/14. Using IDS Telemetry for Threat Hunting.mp4
5.1 MB
Exercise Files.rar
8.4 MB
04. Using IDS Events for Threat Detection/16. Demo-Exploring Zeeks Event Data.mp4
30 MB
04. Using IDS Events for Threat Detection/17. Demo-Identifying Adversary Techniques from IDS Telemetry.mp4
22 MB
04. Using IDS Events for Threat Detection/18. Demo-Identifying Adversary Techniques from IDS Telemetry.mp4
20 MB
05. Using Network Application Data for Anomaly Detection/19. Discussing Application Anomalies.mp4
5.0 MB
05. Using Network Application Data for Anomaly Detection/20. Demo-Exploring Application Data.mp4
23 MB
05. Using Network Application Data for Anomaly Detection/21. Demo-Configuring Additional Application Data Context.mp4
17 MB
05. Using Network Application Data for Anomaly Detection/22. Demo-Using Application Data for Threat Detection.mp4
16 MB
05. Using Network Application Data for Anomaly Detection/23. Demo-Additional Threat Detection with Application Data.mp4
23 MB
06. Correlating Network Telemetry for Threat Detection/24. Discussing Event Correlation.mp4
4.3 MB
06. Correlating Network Telemetry for Threat Detection/25. Demo-Installing and Using Auditbeat.mp4
16 MB
06. Correlating Network Telemetry for Threat Detection/26. Demo-Correlating Auditbeat with Network Traffic.mp4
26 MB
06. Correlating Network Telemetry for Threat Detection/27. Demo-Correlating Network Events and Telemetry.mp4
24 MB
06. Correlating Network Telemetry for Threat Detection/28. Reviewing Network Event Analysis.mp4
4.1 MB
06. Correlating Network Telemetry for Threat Detection/29. Additional Resources for Network Event Analysis.mp4
4.8 MB