- Course
Zeek Components and Deployment
Visibility is crucial in detecting and responding to cyber threats. Learn the capabilities, deployment, and configuration of Zeek for your enterprise.
- Course
Zeek Components and Deployment
Visibility is crucial in detecting and responding to cyber threats. Learn the capabilities, deployment, and configuration of Zeek for your enterprise.
Get started today
Access this course and other top-rated tech content with one of our business plans.
Try this course for free
Access this course and other top-rated tech content with one of our individual plans.
This course is included in the libraries shown below:
- Security
What you'll learn
Enterprises are overwhelmed with cyber attacks. They also lack the visibility necessary to adequately detect and respond to cyber attacks. In this course, Zeek Components and Deployment, you’ll learn to deploy an open-source network monitoring tool to detect interesting activity. First, you’ll explore the various deployment models and components of this solution. Next, you’ll discover the frameworks that it uses to help you gain additional visibility and context in your network. Finally, you’ll learn how to install and configure Zeek. When you’re finished with this course, you’ll have the skills and knowledge of how to properly deploy, install, and configure Zeek as a network security monitor.