Featured resource
Forrester Wave Report 2025
Pluralsight named a Leader in the Forrester Wave™

Our tech skill development platform earned the highest scores possible across 11 criteria.

Learn more
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

Analyze Network Traffic with Zeek Logs

Visibility is crucial in detecting and responding to cyber threats. This course will teach you how to utilize Zeek to analyze the network data for analysis.

Joe Abraham - Pluralsight course - Analyze Network Traffic with Zeek Logs
by Joe Abraham

What you'll learn

Enterprises are overwhelmed with cyber attacks. They also lack the visibility necessary to adequately detect and respond to cyber attacks. In this course, Analyze Network Traffic with Zeek Logs, you’ll learn to deploy an open-source network monitoring tool to detect anomalous network activity. First, you’ll explore Zeek’s logging mechanisms and how you can modify them to suit your organization’s needs. Next, you’ll discover how to interpret the Zeek logs to find information about the network functionality, as well as how to look for basic anomalies. Finally, you’ll learn how to use Zeek to interpret connection sessions as well as NTFS file system streams. When you’re finished with this course, you’ll have the skills and knowledge of how to use Zeek’s monitoring mechanisms for network analysis.

Table of contents

About the author

Joe Abraham - Pluralsight course - Analyze Network Traffic with Zeek Logs
Joe Abraham

Joe is a Network Consulting Engineer and has worked in the IT industry since 2010. He has experience in teaching and mentoring IT professionals in both DoD environments and in the civilian sector, in both the networking and IT security fields.

More Courses by Joe