Featured resource
Tech Upskilling Playbook 2025
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Learn more
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

Incident Response with Zeek

Visibility is crucial in detecting and responding to cyber threats. This course will teach you how to utilize Zeek to proactively threat hunt and perform incident response activities.

Joe Abraham - Pluralsight course - Incident Response with Zeek
by Joe Abraham

What you'll learn

Enterprises are overwhelmed with cyber attacks. They also lack the visibility necessary to adequately detect and respond to cyber attacks. In this course, Incident Response with Zeek, you’ll learn to use this tool for incident response operations. First, you’ll learn about Zeek deployments and how to make the most of the various sensors in your environment. Next, you’ll explore how to utilize Zeek logs for incident response and forensic analysis. Finally, you’ll discover how to use Zeek in conjunction with identity and email management solutions such as Active Directory to enhance security monitoring. When you’re finished with this course, you’ll have the skills and knowledge of how to use Zeek as a robust tool in your security operations activities.

Table of contents

About the author

Joe Abraham - Pluralsight course - Incident Response with Zeek
Joe Abraham

Joe is a Network Consulting Engineer and has worked in the IT industry since 2010. He has experience in teaching and mentoring IT professionals in both DoD environments and in the civilian sector, in both the networking and IT security fields.

More Courses by Joe