Practical Analysis with Security Onion 2

This course is a primer course designed to demonstrate the three essential analyst workflows in Security Onion: Alert Triage, Hunting, & Detection Engineering

This course is geared for those interested in seeing how Security Onion is used practically to triage alerts, hunt for threats, as well as build new detections. This course consists of three case studies that briefly cover the 3 most common workflows used in Security Onion:

  • Case Study 1: Alert Triage & Case Creation - This case study walks through how to triage alerts within the alerts interface including escalation to TheHive.
  • Case Study 2: Ad Hoc Threat Hunting - This case study focuses on threat hunting within Security Onion using the Hunt interface, targeting SSL & Sysmon logs.
  • Case Study 3: Detection Engineering - This case study covers ingesting Google Workspace audit logs into Security Onion and writing Sigma rules within Playbook targeting these new logs.

Prerequisites: Security Onion Essentials is the recommended prerequisite for Practical Analysis with Security Onion.

Upon completing the class, attendees will receive a Certificate of Completion.

Please note that pricing is per student. If you have multiple students attending the training in one conference room, please register each student individually.


Your Instructor


Josh Brower & Matt Gracie
Josh Brower & Matt Gracie

Frequently Asked Questions


How long do I have access to the course?
You will have full access for 6 months after purchase.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.
Will I get an invoice or receipt for my purchase?
You will automatically get a receipt for your purchase and it will include all the information that you need for tax purposes.

Get started now!