Featured resource
2025 Tech Upskilling Playbook
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Check it out
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

Utilizing Zeek 4 in an Enterprise Environment or for Distributed Operations

Zeek is an open-source network security monitoring (NSM) tool. This course will teach you how to deploy Zeek at scale and how to use Zeek data for continuous monitoring, threat hunting, and incident response.

Michael Edie - Pluralsight course - Utilizing Zeek 4 in an Enterprise Environment or for Distributed Operations
Michael Edie
What you'll learn

Cybersecurity professionals are tasked with defending networks against malicious attackers who are becoming more sophisticated and harder to detect. In this course, Utilizing Zeek 4 in an Enterprise Environment or for Distributed Operations, you'll learn how to deploy this tool to support network security operations. First, you’ll explore how to design a Zeek deployment for Enterprise Monitoring. Next, you’ll discover how Zeek can support Continuous Monitoring. Finally, you’ll learn how to use Zeek for Threat Hunting and Incident Response. When you’re finished with this course, you’ll have the skills and knowledge of using Zeek to rapidly identify indicators of compromise, security control deviations, and to actively pursue adversarial threats on a network.

Table of contents

About the author
Michael Edie - Pluralsight course - Utilizing Zeek 4 in an Enterprise Environment or for Distributed Operations
Michael Edie

Principal Engineer at SmashTheStack.org, Information Security Consultant and Pluralsight Author

Get access now

Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere.

Get started with Pluralsight