Practical Analysis with Security Onion 2
This course is a primer course designed to demonstrate the three essential analyst workflows in Security Onion: Alert Triage, Hunting, & Detection Engineering
This course is geared for those interested in seeing how Security Onion is used practically to triage alerts, hunt for threats, as well as build new detections. This course consists of three case studies that briefly cover the 3 most common workflows used in Security Onion:
- Case Study 1: Alert Triage & Case Creation - This case study walks through how to triage alerts within the alerts interface including escalation to TheHive.
- Case Study 2: Ad Hoc Threat Hunting - This case study focuses on threat hunting within Security Onion using the Hunt interface, targeting SSL & Sysmon logs.
- Case Study 3: Detection Engineering - This case study covers ingesting Google Workspace audit logs into Security Onion and writing Sigma rules within Playbook targeting these new logs.
Prerequisites: Security Onion Essentials is the recommended prerequisite for Practical Analysis with Security Onion.
Upon completing the class, attendees will receive a Certificate of Completion.