강의

멘토링

커뮤니티

Security & Network

/

Computer Security

[Security] Building and Operating a Threat Hunting System Using Wazuh+ELK (SIEM) (Basic)

[Training for Security Experts] Master how to build and operate an optimized threat hunting system by combining Wazuh and the ELK stack. Upgrade your security skills with strategies and hands-on exercises that can be applied directly in the field!

(4.9) 8 reviews

140 learners

Level Basic

Course period Unlimited

  • zeromini
security
security
Linux
Linux
Microsoft Windows
Microsoft Windows
ossec
ossec
wazuh
wazuh
security
security
Linux
Linux
Microsoft Windows
Microsoft Windows
ossec
ossec
wazuh
wazuh

What you will gain after the course

  • Building a Real Threat Hunting System: Systematically practice how to build your own threat hunting system using a combination of Wazuh and ELK (SIEM).

  • Mastering Various Interworking Methods: We will deeply explore the differences between Agent and Agentless methods, their respective applications, and implement them in practice.

  • Threat Detection with Real-World Attack Scenarios: We will simulate real-world attacks through three scenarios—ransomware, web shell, and deface attacks—and practice detecting them.

  • How to Use Sysmon & Suricata: Practice how to further enhance the detection capabilities of a threat hunting system by utilizing Sysmon and Suricata tools.

  • Application in real-world security environments: To enable the application of learned content in the field, we delve deeply into system construction and operational strategies in real-world security environments.

🎯 Why is it important to understand threat hunting? 🎯


🔍 What is “Threat Hunting”?

Threat hunting is a proactive security approach that, unlike traditional reactive security control, proactively identifies and analyzes security threats to respond before an attack. This refers to the work of security experts constantly monitoring systems to identify threats that were not detected beforehand.


💡 Why is threat hunting important?

Cyber attacks are becoming more sophisticated by the day. It is becoming difficult to respond to these sophisticated attacks with traditional security solutions alone. This is why security professionals need to be more proactive in finding, analyzing, and responding to threats. Threat hunting is the best methodology to meet this need.


🔐 Wazuh & ELK - Invitation to a new world of security!

  • Learn how to integrate and utilize Wazuh with sysmon, suricata, virustotal, etc.


Wazuh and ELK are tools that can perform this threat hunting process more efficiently, and have become essential tools for threat hunting experts. Through this lecture, you will learn how to use Wazuh and ELK, and acquire proactive security response capabilities.


🚨 So how is it different from general security control?

General security control is mainly about detecting and responding to known threats, but threat hunting requires the ability to discover and respond to new, unknown threats. This means security control that goes beyond simply blocking attacks, but also identifies the cause and root of the attack and prevents it in advance.


Are you ready to take your security capabilities to the next level?

This course is perfect for taking that first step. We invite you to the world of threat hunting using Wazuh and ELK! Register for the course now and start your journey to becoming a security expert! 🌟🛡️🚀

Practice-oriented lectures!

Build a threat hunting infrastructure and practice operational capabilities in a virtual environment.

Apply what you need to know about real threat hunting based on a hypothetical scenario.

Check the content you have found and analyze it in conjunction with other content.

Covers how to use the dashboard and the most important methods

We'll help you follow the class!

  • Provides snapshot virtual images for each chapter (using Naver Drive)

  • For inquiries, please feel free to contact Inflearn and DISCORD's 'Inflearn_Class_Threat Hunting' channel or DM 'Zero Mini'

  • Discord Channel: https://discord.gg/uCQEnRaSMG


To be continued in the future
Threat Hunting Series

You will learn how to improve the threat hunting system in large-scale infrastructure environments by utilizing Ansible and other tools, and sequentially learn threat hunting methods that reflect recent issues such as detailed rule sets and new malware.

Recommended for
these people

Who is this course right for?

  • For those with basic knowledge of building a security environment who want to challenge themselves with building an advanced threat hunting system: This course allows you to systematically learn from basic security knowledge to advanced threat hunting systems through hands-on practice.

  • For IT and security managers who want to strengthen their security infrastructure in a corporate environment: This is suitable for those who want to upgrade the security of their corporate environment by learning how to detect and respond to threats through real-world attack scenarios.

  • For those interested in security tools like Sysmon and Suricata: You can deeply explore how to use these tools and how to efficiently operate a security system.

  • For job seekers and students aspiring to become security experts: This is especially recommended for those who want to develop the security skill sets needed in the field. This course covers core content that can enhance your competitiveness in the security field.

Need to know before starting?

  • Basic security knowledge: A basic understanding of basic attack types, security terms, and security philosophy will make it easier to absorb the lecture content.

  • Linux Basic Operating Knowledge: The course covers system construction and operation in a Linux environment, so you should be familiar with basic Linux commands and environment settings.

  • Log Management and Analysis: Basic knowledge of the structure and analysis methods of log files will be of great help in threat detection and analysis covered in the lecture.

  • Basic network knowledge: Requires basic understanding of OSI 7 Layer, TCP/IP, and major protocols and ports.

Hello
This is

502

Learners

12

Reviews

65

Answers

5.0

Rating

1

Course

(Final successful candidates as of Dec '25: 173, Number of companies: 85)

We aim for rapid employment success based on expertise.
We propose IT career development that can respond to the future.

Final Job Placement Status of ZeroMini Students from Employment Bomber

Bank of Korea, Financial Security Institute, Korea Development Bank, Korea Securities Depository, KEPCO KDN, KEPCO KPS, Korea Southern Power, National Information Society Agency, Korea Gas Corporation, Korea SMEs and Startups Agency, Korea Airports Corporation, Korea Local Information Research & Development Institute, Koscom, Korea Railroad Corporation, Korea Electric Power Corporation, Korea Water Resources Corporation, Incheon Transit Corporation, Incheon International Airport Corporation, National University Hospitals, Export-Import Bank of Korea, Korea Employment Information Service, Korea Housing Finance Corporation, Korea Federation of Credit Guarantee Foundations, Korea Fishing Communities Institute, Government Employees Pension Service, Korea Technology Finance Corporation, Samsung Securities, NAVER Cloud, Korea Expressway Corporation, Korea Rural Community Corporation, Korea Financial Telecommunications & Clearings Institute, Nonghyup Bank, University IT Staff, Korea Shipping Association, Gyeongsang National University Hospital, Korea Middle Power, Ourhome, Korea Housing & Urban Guarantee Corporation, Korea Public Finance Information Service, Korea South-East Power, Nonghyup Information Systems, Korea Tourism Organization, Korea Trade Insurance Corporation, Korea LX, Korea Education and Research Information Service, Korea Asset Management Corporation, Health Insurance Review and Assessment Service, Korea Radioactive Waste Agency, SGI Seoul Guarantee, National Health Insurance Service, KT, Korea Ocean Business Corporation, Korea Authority of Land & Infrastructure Safety, Human Resources Development Service of Korea, Woori Bank, Jeonbuk Bank, Kyobo Information & Communication, Seoul Design Foundation, Pusan National University Hospital, Financial Supervisory Service, Korea Energy Agency, Seoul Facilities Corporation, Korean Teachers' Credit Union, Daejeon Tourism Organization, Korea Agro-Fisheries & Food Trade Corporation, Woori Financial Capital, Korean Red Cross, Small & Medium Business Distribution Center, Korea Industrial Complex Corporation, Credit Finance Association, Korea Social Security Information Service, Korea Health Personnel Licensing Examination Institute, Korea Venture Investment, AREX, Korea Basic Science Institute, Korea Strategic Trade Institute, Korea Land and Housing Corporation, National Pension Service, Gyeonggi Credit Guarantee Foundation, Hanam Urban Corporation, Korea Power Exchange

Curriculum

All

24 lectures ∙ (6hr 2min)

Course Materials:

Lecture resources
Published: 
Last updated: 

Reviews

All

8 reviews

4.9

8 reviews

  • thejysplay8464님의 프로필 이미지
    thejysplay8464

    Reviews 1

    Average Rating 5.0

    5

    86% enrolled

    • wolfses3227님의 프로필 이미지
      wolfses3227

      Reviews 4

      Average Rating 4.8

      4

      100% enrolled

      • ykg04261353님의 프로필 이미지
        ykg04261353

        Reviews 3

        Average Rating 5.0

        5

        33% enrolled

        • taerim51511688님의 프로필 이미지
          taerim51511688

          Reviews 19

          Average Rating 4.9

          5

          33% enrolled

          • bangga331889님의 프로필 이미지
            bangga331889

            Reviews 14

            Average Rating 4.6

            5

            100% enrolled

            zeromini's other courses

            Check out other courses by the instructor!

            Similar courses

            Explore other courses in the same field!