How to use Zeek to hunt down attackers

An Introduction to Threat Hunting with Bro Zeek

Cover

Watch this webcast for an introductory overview of the threat hunting capabilities of the Zeek Network Security Monitor, with demos of sample threat hunting queries in Elastic and guidance on how to get started in your own environment.

Hear from Richard Chitamitre, Jonathon Hall, and Andrew Pease—3 elite threat hunters with years of military service fighting on the cyberwarfare frontlines—on how to start using Zeek to hunt down attackers.

Vendor:
Corelight
Posted:
05 Feb 2019
Premiered:
05 Feb 2019
Format:
Video
Type:
Product Demo
Language:
English
Already a Bitpipe member? Login here

Download this Product Demo!