Threat Hunting with Elastic Stack
Elastic security offers enhanced threat hunting capabilities to build active defense strategies. Complete with practical examples and tips, this easy-to-follow guide will help you enhance your security skills by leveraging the Elastic Stack for security monitoring, incident response, intelligence analysis, or threat hunting.
Offered by
Difficulty Level
Intermediate
Completion Time
13h4m
Language
English
About Book
Who Is This Book For?
Security analysts, cybersecurity enthusiasts, information systems security staff, or anyone who works with the Elastic Stack for security monitoring, incident response, intelligence analysis, or threat hunting will find this book useful. Basic working knowledge of IT security operations and network and endpoint systems is necessary to get started.
Threat Hunting with Elastic Stack
- About Book
- Who Is This Book For?
- Book Content
Book content
chapters • 13h4m total length
Introduction to Cyber Threat Intelligence, Analytical Models, and Frameworks
Hunting Concepts, Methodologies, and Techniques
Introduction to the Elastic Stack
Building Your Hunting Lab – Part 1
Building Your Hunting Lab – Part 2
Data Collection with Beats and Elastic Agent
Using Kibana to Explore and Visualize Data
The Elastic Security App
Using Kibana to Pivot Through Data to Find Adversaries
Leveraging Hunting to Inform Operations
Enriching Data to Make Intelligence
Sharing Information and Analysis
Related Resources
Access Ready-to-Use Books for Free!
Get instant access to a library of pre-built books—free trial, no credit card required. Start training your team in minutes!