-
Course
- Security
Zeek Components and Deployment
Visibility is crucial in detecting and responding to cyber threats. Learn the capabilities, deployment, and configuration of Zeek for your enterprise.
What you'll learn
Enterprises are overwhelmed with cyber attacks. They also lack the visibility necessary to adequately detect and respond to cyber attacks. In this course, Zeek Components and Deployment, you’ll learn to deploy an open-source network monitoring tool to detect interesting activity. First, you’ll explore the various deployment models and components of this solution. Next, you’ll discover the frameworks that it uses to help you gain additional visibility and context in your network. Finally, you’ll learn how to install and configure Zeek. When you’re finished with this course, you’ll have the skills and knowledge of how to properly deploy, install, and configure Zeek as a network security monitor.
Table of contents
About the author
Joe is a Network Consulting Engineer and has worked in the IT industry since 2010. He has experience in teaching and mentoring IT professionals in both DoD environments and in the civilian sector, in both the networking and IT security fields.
More Courses by Joe