Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Detection Engineering with Security Onion 2.4
Detection Engineering with Security Onion 2.4
Detection Engineering Overview (9:16)
Detection Engineering Overview Quiz
Reactive Detection Gap Analysis
Post-Compromise Incident Review (7:22)
Scenario 1 - Addressing Detection Gaps with Suricata (38:39)
Scenario 1 Quiz
Scenario 2 – Manipulating Zeek File Extraction (19:27)
Scenario 2 Quiz
Scenario 3 – Implementing Custom Yara Rules (31:54)
Scenario 3 Quiz
Proactive Detection Gap Analysis
Scenario 4 – Host Baselines Using Elastic Agent & Osquery (39:18)
Scenario 4 - Quiz
Scenario 5 – Adversary Deception using an Intrusion Detection Honeypot (IDH) Node (15:52)
Scenario 5 - Quiz
Course Wrapup
Course Wrap up (3:45)
Feedback
Scenario 4 – Host Baselines Using Elastic Agent & Osquery
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock