
보안을 위한 오픈 검색 서비스 Shodan, Censys 등 활용과 개발
보안프로젝트
OSINT(Open Source Intelligence) 검색 서비스를 활용하여 많은 보안 해킹 사고들이 발생하고 있습니다. 공격이 들어오기 전에 오펜시브(Offensive) 관점으로 잠재적인 보안 위협을 먼저 모니터링하고 제거하기 위한 활용 방법을 다룹니다.
Cơ bản
모의해킹
You can understand the integrated log analysis construction step by step through practice using ELK, and it presents a method to visualize the logs of each system by integrating them. It can be used in various fields such as general data analysis utilization, breach incident analysis response, etc.
Building an integrated log system using ELK
Using Elasticsearch
Using Kibana visualization
Using logstash
Operating multiple systems generates a variety of logs. To verify normal system operation and quickly assess security breaches, these logs must be collected and managed, easily searchable, and visualized on a time basis. The freely available ELK (Elasticsearch, Logstash, Kibana) system offers all three of these capabilities. While easy to set up, fully utilizing it requires understanding its features.
This lecture provides a step-by-step guide to building an ELK unified log on the Ubuntu operating system that even beginners can follow. It also presents search methods in Elasticsearch, log forwarding using Logstash and Filebeat, and various visualization methods using Kibana.
Security Project - Frontline Technology Director
-Choi Il-seon, Technical Director, Online Instructor, Security Project
-Multi-campus IT security external expert instructor
- Hancom MDS IT security, data analysis external expert instructor
-K-Shield Junior external professional instructor
-Hansae Cyber, Dongil Industrial High School Cyber Guardians external expert instructor
- Author of "Complete Practice of Web Mock Hacking Using Vibox"
"Windows Application Vulnerability Analysis" online course
-"Memory Analysis Techniques for Malware Analysis" online lecture
-Long-term course on "Data Analysis Utilization"
-Long-term course on "Malware Analysis by Type"
- Over 20 lectures, including the online course "Introduction to Network Packet Analysis and Malware Sample Analysis."
Who is this course right for?
Those who want to apply ELK open tools in practice
For those who want to understand the integrated log analysis system
Those who have chosen the career path of breach analysis and response
Need to know before starting?
Linux Basics
Log Analysis Basics
100,604
Learners
3,029
Reviews
443
Answers
4.7
Rating
67
Courses
보안프로젝트 ( www.boanproject.com )는 IT보안, 빅데이터, 머신러닝, IoT 등 다양한 분야의 온라인 강의, 그룹 강의를 진행하고 있습니다.
All
75 lectures ∙ (18hr 31min)
Course Materials:
All
65 reviews
4.5
65 reviews
Limited time deal ends in 07:34:09
$66,000.00
25%
$68.20
Check out other courses by the instructor!
Explore other courses in the same field!