What you’ll learn:
Enterprises are overwhelmed with cyber attacks. They also lack the visibility necessary to adequately detect and respond to cyber attacks. In this course, Threat Detection with Zeek Scripts, you’ll learn to deploy an open-source network monitoring tool to detect malicious activity. First, you’ll learn about Zeek’s scripting language and how it can be used for security monitoring. Next, you’ll explore how to appropriately write a Zeek script. Finally, you’ll discover how to implement best practices when using and writing scripts for Zeek. When you’re finished with this course, you’ll have the skills and knowledge of how to extend Zeek’s detection mechanisms using scripting.