Threat Hunting with Kibana
During this training, participants learn through assignments how to detect threats and how this differs from other security analysis processes. Then they learn how to use Elastic Stack and its powerful tools to support this process.
For whom is this training intended?
This four-day training is suitable for security analysts interested in using Kibana to investigate potential threats to their data and systems.
What do you learn during the training?
- The essential Kibana functionalities for analysing security data.
- How network and host data sources can be enriched.
- The philosophy, workflow, models and techniques that can be applied in the hunt for (cyber) threats.
- How Threat Hunting helps improve the effectiveness of the Security Operations Center.