Generating and Analyzing Logs

Generate nefarious logs and use tools to analyze.

Difficulty: Intermediate CSF Domain: Respond


Price represents the non member rate.

Buy Now
or pay later by invoice
As a network security expert, it is your responsibility to know how to use various tools within the Security Onion system. You will generate an attack within Kali Linux in order to trip alerts in Sguil and Kibana. You will need to be able to navigate through the Elastic Stack to investigate logs in order to be a blue team practitioner.

Continuing Professional Education (CPE) Credit Count: 2