Featured resource
2025 Tech Upskilling Playbook
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Check it out
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

Zeek Components and Deployment

Visibility is crucial in detecting and responding to cyber threats. Learn the capabilities, deployment, and configuration of Zeek for your enterprise.

Joe Abraham - Pluralsight course - Zeek Components and Deployment
Joe Abraham
What you'll learn

Enterprises are overwhelmed with cyber attacks. They also lack the visibility necessary to adequately detect and respond to cyber attacks. In this course, Zeek Components and Deployment, you’ll learn to deploy an open-source network monitoring tool to detect interesting activity. First, you’ll explore the various deployment models and components of this solution. Next, you’ll discover the frameworks that it uses to help you gain additional visibility and context in your network. Finally, you’ll learn how to install and configure Zeek. When you’re finished with this course, you’ll have the skills and knowledge of how to properly deploy, install, and configure Zeek as a network security monitor.

Table of contents

About the author
Joe Abraham - Pluralsight course - Zeek Components and Deployment
Joe Abraham

Joe is a Network Consulting Engineer and has worked in the IT industry since 2010. He has experience in teaching and mentoring IT professionals in both DoD environments and in the civilian sector, in both the networking and IT security fields.

Get access now

Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere.

Get started with Pluralsight