Featured resource
2025 Tech Upskilling Playbook
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Check it out
  • Lab
    • Libraries: If you want this lab, consider one of these libraries.
    • Security
Google Cloud Platform icon
Labs

Monitoring and Detection: Graylog

In this lab, you’ll practice Graylog stack data analysis. When you’re finished, you’ll have the knowledge to determine potential attacks based on careful analysis of available information, including zeek/filebeat log data. .

Google Cloud Platform icon
Lab platform
Lab Info
Level
Beginner
Last updated
Oct 16, 2025
Duration
1h 45m

Contact sales

By clicking submit, you agree to our Privacy Policy and Terms of Use.
Table of Contents
  1. Challenge

    Navigating the Graylog Interface

    This challenge will familiarize participants with Graylog by exploring its interface. This challenge provides a guided walkthrough of Graylog's core features, helping you understand how to visualize network traffic data effectively.

  2. Challenge

    Identifying Port/Protocol Mismatches

    This challenge will require participants to review network traffic data to identify discrepancies between port numbers and their expected protocols. Such mismatches may signal misconfigurations, unauthorized services, or malicious activities. Utilizing the pre-collected Zeek dataset, the goal is to discern and scrutinize these anomalies for insight into their origins and implications.

  3. Challenge

    Detecting Beaconing Hosts

    This challenge requires participants to sift through network traffic data to detect hosts demonstrating regular periodic communication with external servers—behavior indicative of command and control (C2) server interactions. The task of leveraging pre-captured Zeek data and simulated beaconing traffic is to identify these clandestine communications, analyze their frequency, and investigate the involved external entities.

  4. Challenge

    Uncovering Data Exfiltration Attempts

    In this challenge, participants examine outbound network traffic to unearth indicators of data exfiltration. By scrutinizing traffic for volume, frequency, and destination anomalies, the objective is to detect unusual patterns potentially indicative of unauthorized data transfers. Using simulated exfiltration activities, the aim is to identify these attempts and comprehend their execution mechanisms.

  5. Challenge

    The Last Challenge

    Welcome to the final challenge! This is your last chance to experiment in the environment. Clicking Finish Lab will end this little world that flittered into existence just for you.

About the author

Pluralsight Skills gives leaders confidence they have the skills needed to execute technology strategy. Technology teams can benchmark expertise across roles, speed up release cycles and build reliable, secure products. By leveraging our expert content, skill assessments and one-of-a-kind analytics, keep up with the pace of change, put the right people on the right projects and boost productivity. It's the most effective path to developing tech skills at scale.

Real skill practice before real-world application

Hands-on Labs are real environments created by industry experts to help you learn. These environments help you gain knowledge and experience, practice without compromising your system, test without risk, destroy without fear, and let you learn from your mistakes. Hands-on Labs: practice your skills before delivering in the real world.

Learn by doing

Engage hands-on with the tools and technologies you’re learning. You pick the skill, we provide the credentials and environment.

Follow your guide

All labs have detailed instructions and objectives, guiding you through the learning process and ensuring you understand every step.

Turn time into mastery

On average, you retain 75% more of your learning if you take time to practice. Hands-on labs set you up for success to make those skills stick.

Get started with Pluralsight