With rapidly evolving threat landscape, businesses should understand it’s more crucial than ever to have a comprehensive security strategy in place. To get clear insight into what is occurring on the company’s network from a security perspective, IT Security professionals should be able to work with different data feeds such as Suricata. It is an open-source detection engine that can act as an intrusion detection system (IDS) or intrusion prevention system (IPS), and is capable of network security monitoring (NSM) and offline packet capture (pcap) processing.
‘Suricata for Incident
The course is useful for both companies aiming to power up their security policy and individual learners, looking to advance their career in threat hunting.
The well-structured videos and hands-on virtual labs provide for effective learning, while the on-demand format is great for studying at your own pace. By immediately putting the gained knowledge to practice with guidance from Tatyana Shishkova, Lead Security Researcher (GReAT) at Kaspersky, learners will equip themselves with high-quality threat hunting skills.
“We’ve tried to gather all our experience so the most useful tips and recommendations on how to use Suricata effectively are available to those who would like to enhance their skills in threat hunting. Together with each student, we will study step-by-step how to write rules and analyze network traffic. We hope it will help our listeners to stay ahead of the ever-evolving threat landscape”, says Tatyana Shishkova, Lead Security Researcher (GReAT) at Kaspersky.