Digital Forensics Training

Networking Security Monitoring Cyber Operator

During this five-day training, participants will learn to work with a suite of cybersecurity tools. Although it features open-source security tools, the Networking Security Monitoring Cyber Operator does not involve tool training. The aim of the training is to teach Cybersecurity Operators to detect and track cyber threats using Elastic Stack and tools such as Zeek and Suricata.

To conclude the training, participants work on a case with multiple scenarios, using the skills they have learned to find the 'enemy' in network traffic.

For whom is this training intended?
This training is suitable for Cybersecurity Operators who need to analyse data to detect bad actors in their network as part of a machine-assisted, human-driven approach.

We recommend attending this training only if you are familiar with Linux, networking and network security concepts.

What do you learn during the training?

  • Basics of Packet analysis
  • Intrusion detection systems (IDS) with Suricata
  • Network Metadata Analyses with Zeek
  • Kibana UI for Security
  • Threat hunting Capstone

Want more information about this training? Please contact us.

This website uses cookies

We find it very important that you are aware of which cookies our website uses and for which purposes. We use Functional Cookies to make our website function properly. In addition, we use Analytics Cookies to analyze the use of our website. We also ask your permission for the placement of cookies from third parties (social media, advertising and analytics partners) with whom we share information. By clicking 'Accept', you accept the placement of the above mentioned cookies. If you click on 'Settings', you will be taken to a page where you can specify which cookies may and may not be placed. Click here for our Privacy Statement.