• Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

Zeek Components and Deployment

Visibility is crucial in detecting and responding to cyber threats. Learn the capabilities, deployment, and configuration of Zeek for your enterprise.

Joe Abraham - Pluralsight course - Zeek Components and Deployment
by Joe Abraham

What you'll learn

Enterprises are overwhelmed with cyber attacks. They also lack the visibility necessary to adequately detect and respond to cyber attacks. In this course, Zeek Components and Deployment, you’ll learn to deploy an open-source network monitoring tool to detect interesting activity. First, you’ll explore the various deployment models and components of this solution. Next, you’ll discover the frameworks that it uses to help you gain additional visibility and context in your network. Finally, you’ll learn how to install and configure Zeek. When you’re finished with this course, you’ll have the skills and knowledge of how to properly deploy, install, and configure Zeek as a network security monitor.

Table of contents

About the author

Joe Abraham - Pluralsight course - Zeek Components and Deployment
Joe Abraham

Joe is a Network Consulting Engineer and has worked in the IT industry since 2010. He has experience in teaching and mentoring IT professionals in both DoD environments and in the civilian sector, in both the networking and IT security fields.

More Courses by Joe