Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Detection Engineering with Security Onion 2.4
Detection Engineering with Security Onion 2.4
Detection Engineering Overview (9:16)
Detection Engineering Overview Quiz
Reactive Detection Gap Analysis
Post-Compromise Incident Review (8:29)
Scenario 1 - Addressing Detection Gaps with Suricata (53:12)
Scenario 1 Quiz
Scenario 2 – Manipulating Zeek File Extraction (24:14)
Scenario 2 Quiz
Scenario 3 – Implementing Custom Yara Rules (33:51)
Scenario 3 Quiz
Proactive Detection Gap Analysis
Scenario 4 – Host Baselines Using Elastic Agent & Osquery (33:15)
Scenario 4 - Quiz
Scenario 5 – Adversary Deception using an Intrusion Detection Honeypot (IDH) Node (29:40)
Scenario 5 - Quiz
Course Wrapup
Course Wrap up (3:45)
Feedback
Scenario 4 – Host Baselines Using Elastic Agent & Osquery
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock