Zeek is a great open-source tool that allows you to monitor your network and analyze events within it. This course will teach you about this tool, and how to configure and use it within your network to suit your needs.
Zeek is an event-based network monitoring and analysis tool used by many organizations. It enables users to see the traffic going through our networks and respond to it in different ways. Learning how to configure, use, and customize this tool will help you manage your network effectively. In this course, Getting Started with Zeek, you will learn all about this tool and how it functions, as well as how to use it. First, you will learn about the tool, it's purpose, and functionality. Next, you will learn about the pieces of the tool and how they interact with each other. Finally, you will explore the language Zeek uses and how you can use it to help your environment. When you're finished with this course, you will have a full understanding of the the tool and be able to use it effectively in your own network.
Joe is a Network Consulting Engineer and has worked in the IT industry since 2010. He has experience in teaching and mentoring IT professionals in both DoD environments and in the civilian sector, in both the networking and IT security fields.
Course Overview (Music) Hi everyone. My name is Joe Abraham, and welcome to my course, Getting Started with Zeek. I'm currently a network security consultant and a Pluralsight course author for both IT operations and security domains. Are you trying to monitor your network effectively, but can't find the right tool? Well, in this course, we're going to help. We'll walk you through the open source tool known as Zeek to help you implement the traffic analysis framework that's very flexible and efficient. Some of the major topics that we'll cover include detailing Zeek's capabilities, installing and configuring Zeek, learning Zeek's language, and getting valuable output from Zeek. By the end of this course, you'll know all about Zeek and its functions, as well as how to install, configure, and operate Zeek in an enterprise environment. Before beginning the course, you should be familiar with basic IT terminology and network functionality. From here, you should feel comfortable diving further into Zeek's scripting and learning more about network and security analysis in general through skill paths at Pluralsight such as Security Event Triage, and courses such as Network Monitoring and Analysis and Getting Started with Packet Analysis. I hope you'll join me on this journey to learn more about this great tool with the Getting Started with Zeek course, here at Pluralsight.