Digital Forensics Training

Networking Security Monitoring Cyber Operator

During this five-day training, participants will learn to work with a suite of cybersecurity tools. Although it zooms in on the best open-source security tools, the Networking Security Monitoring Cyber Operator does not involve tool training. The aim of the training is to teach Cybersecurity Operators to detect and track cyber threats using Elastic Stack and tools such as Zeek and Suricata.

To conclude the training, participants work on a case with multiple scenarios, both individually and in teams, using the skills they have learned to find the 'enemy' in network traffic.

For whom is this training intended?
This training is suitable for Cybersecurity Operators who need to analyse data as a team to detect bad actors in their network as part of a machine-assisted or human-driven approach.

We recommend attending this training only if you:

  • are familiar with Linux, networking and network security concepts.
  • have fundamental knowledge of Zeek.
  • have basic operational knowledge of Kibana.

What do you learn during the training?

  • Basics of package analysis
  • Protocol analyses with Zeek
  • Intrusion detection systems (IDS)
  • Kibana for operators
  • Threat hunting

Want more information about this training? Please contact us.

This website uses cookies

We find it very important that you are aware of which cookies our website uses and for which purposes. We use Functional Cookies to make our website function properly. In addition, we use Analytics Cookies to analyze the use of our website. We also ask your permission for the placement of cookies from third parties (social media, advertising and analytics partners) with whom we share information. By clicking 'Accept', you accept the placement of the above mentioned cookies. If you click on 'Settings', you will be taken to a page where you can specify which cookies may and may not be placed. Click here for our Privacy Statement.