As cyber attacks become increasingly sophisticated each day, it is critical for organizations’ security teams to detect attacks at an early stage and manage logs effectively.
In this training, participants will learn how to analyze Windows, Linux, and network logs, enrich log data using Sysmon, conduct threat hunting on the Elastic Stack (ELK), and detect Red Team attack techniques such as ransomware, brute force, and web exploitation.