Hamburger Icon
  • Labs icon Lab
  • Security
Google Cloud Platform icon
Labs

Data Visualization with the Kibana Dashboard

In this lab, you will build and analyze Kibana dashboards to monitor web activity and detect security threats. Using built-in web sample data, you will create visualizations to understand traffic patterns and user behavior. Additionally, you will analyze the UWF-TestZeekData24 dataset to detect Indicators of Compromise (IOCs) related to Credential Access, Exfiltration, and Reconnaissance. You will build a Credential Access Monitoring Dashboard to visualize attack trends, identify high-frequency attacker IPs, and track suspicious authentication attempts. By the end of this lab, you will be able to design effective security dashboards, query logs for suspicious activity, and enhance security monitoring and incident response.

Google Cloud Platform icon
Labs

Path Info

Level
Clock icon Beginner
Duration
Clock icon 1h 0m
Published
Clock icon Mar 11, 2025

Contact sales

By filling out this form and clicking submit, you acknowledge our privacy policy.

Table of Contents

  1. Challenge

    Getting Started in the Lab Environment

    Here are the initial instructions and explanation of the lab environment. Read this while your environment is busy creating itself from nothing. Yes, this violates physics; we know. How fun!

  2. Challenge

    Building a Basic Kibana Dashboard

    In this first challenge, you will explore Kibana's built-in Sample Web Logs dataset to create a foundational dashboard. This dataset simulates Apache-style web logs, providing insights into website traffic and user behavior. You will build visualizations to monitor web traffic patterns, user geolocation, and response codes. By customizing the dashboard, you will gain hands-on experience in designing effective data visualizations, essential for real-time monitoring and analysis of web activity.

  3. Challenge

    Visualizing Security Logs for Threat Detection

    In this challenge, you will perform a detailed security log analysis using the UWF-TestZeekData24 dataset. This dataset includes logs categorized by MITRE ATT&CK tactics such as Credential Access, Exfiltration, and Reconnaissance. You will analyze these logs to identify Indicators of Compromise (IOCs) and detect suspicious activity patterns. Using Kibana, you will create visualizations to highlight potential threats and combine them into a comprehensive security monitoring dashboard. This challenge provides hands-on experience in threat hunting and security monitoring using Kibana.

  4. Challenge

    The Last Challenge

    Welcome to the final challenge! This is your last chance to experiment in the environment. Clicking Finish Lab will end this little world that flittered into existence just for you.

Sean Wilkins is an accomplished networking consultant and writer for infoDispersion (www.infodispersion.com) who has been in the IT field for over 20 years working with several large enterprises.

What's a lab?

Hands-on Labs are real environments created by industry experts to help you learn. These environments help you gain knowledge and experience, practice without compromising your system, test without risk, destroy without fear, and let you learn from your mistakes. Hands-on Labs: practice your skills before delivering in the real world.

Provided environment for hands-on practice

We will provide the credentials and environment necessary for you to practice right within your browser.

Guided walkthrough

Follow along with the author’s guided walkthrough and build something new in your provided environment!

Did you know?

On average, you retain 75% more of your learning if you get time for practice.