Step 1: Linux Fundamentals
Learn basic operational skills for the Linux command line.
Step 2: Network Protocol Analysis
Explore network protocols to include DHCP, ARP, ICMP, LDAP, Kerberos, SMTP, and SSH.
Step 3: Packet Analysis
Explore networking concepts and packet analysis tools including Wireshark, Stenographer, and Docket.
Step 4: Intrusion Detection System (IDS) Log Analysis with Suricata
Learn how to configure Suricata to automate detections of malicious network traffic.
Step 5: Network Metadata Log Analysis with Zeek
Explore how to install and configure Zeek to improve network security monitoring.
Step 6: Kibana for Security Analysts
Learn how to correlate different data sources and analyze what’s happening in your network.
Step 7: Threat Hunting Capstone with Network Telemetry
The learning path concludes with a summary of threat hunting models and techniques, as well as an unguided hunt focused on analyzing network data and identifying malicious actors.
Boost cybersecurity performance with Elastic Training
Cybersecurity is as much about people as it is about technology. Organizations see fewer breaches and faster times to respond when they build a human layer of security and provide more effective training. Start to build more effective cybersecurity awareness and reduce risk with the Elastic Network Security Analyst learning path. And stay tuned for additional training modules to expand your threat hunting skills.
Leave a Reply