Generating and Analyzing Logs

Generate nefarious logs and use tools to analyze.

Difficulty: Intermediate

CSF Domain: Respond

$45.00

Price represents the non member rate.

Buy now
As a network security expert, it is your responsibility to know how to use various tools within the Security Onion system. You will generate an attack within Kali Linux in order to trip alerts in Sguil and Kibana. You will need to be able to navigate through the Elastic Stack to investigate logs in order to be a blue team practitioner.

Continuing Professional Education (CPE) Credit Count: 2