Inflearn brand logo image
Inflearn brand logo image
Inflearn brand logo image
Security & Network

/

Computer Security

[Security] Building and Operating a Threat Hunting System Using Wazuh+ELK (SIEM) (Basic)

[Training for Security Experts] Master how to build and operate an optimized threat hunting system by combining Wazuh and the ELK stack. Upgrade your security skills with strategies and hands-on exercises that can be applied directly in the field!

(4.9) 7 reviews

126 learners

  • zeromini
보안
wazuh
elk
security
Linux
Microsoft Windows
ossec

What you will learn!

  • Building a Real Threat Hunting System: Systematically practice how to build your own threat hunting system using a combination of Wazuh and ELK (SIEM).

  • Mastering Various Interworking Methods: We will deeply explore the differences between Agent and Agentless methods, their respective applications, and implement them in practice.

  • Threat Detection with Real-World Attack Scenarios: We will simulate real-world attacks through three scenarios—ransomware, web shell, and deface attacks—and practice detecting them.

  • How to Use Sysmon & Suricata: Practice how to further enhance the detection capabilities of a threat hunting system by utilizing Sysmon and Suricata tools.

  • Application in real-world security environments: To enable the application of learned content in the field, we delve deeply into system construction and operational strategies in real-world security environments.

🎯 Why is it important to understand threat hunting? 🎯


🔍 What is “Threat Hunting”?

Threat hunting is a proactive security approach that, unlike traditional reactive security control, proactively identifies and analyzes security threats to respond before an attack. This refers to the work of security experts constantly monitoring systems to identify threats that were not detected beforehand.


💡 Why is threat hunting important?

Cyber attacks are becoming more sophisticated by the day. It is becoming difficult to respond to these sophisticated attacks with traditional security solutions alone. This is why security professionals need to be more proactive in finding, analyzing, and responding to threats. Threat hunting is the best methodology to meet this need.


🔐 Wazuh & ELK - Invitation to a new world of security!

  • Learn how to integrate and utilize Wazuh with sysmon, suricata, virustotal, etc.


Wazuh and ELK are tools that can perform this threat hunting process more efficiently, and have become essential tools for threat hunting experts. Through this lecture, you will learn how to use Wazuh and ELK, and acquire proactive security response capabilities.


🚨 So how is it different from general security control?

General security control is mainly about detecting and responding to known threats, but threat hunting requires the ability to discover and respond to new, unknown threats. This means security control that goes beyond simply blocking attacks, but also identifies the cause and root of the attack and prevents it in advance.


Are you ready to take your security capabilities to the next level?

This course is perfect for taking that first step. We invite you to the world of threat hunting using Wazuh and ELK! Register for the course now and start your journey to becoming a security expert! 🌟🛡️🚀

Practice-oriented lectures!

Build a threat hunting infrastructure and practice operational capabilities in a virtual environment.

Apply what you need to know about real threat hunting based on a hypothetical scenario.

Check the content you have found and analyze it in conjunction with other content.

Covers how to use the dashboard and the most important methods

We'll help you follow the class!

  • Provides snapshot virtual images for each chapter (using Naver Drive)

  • For inquiries, please feel free to contact Inflearn and DISCORD's 'Inflearn_Class_Threat Hunting' channel or DM 'Zero Mini'

  • Discord Channel: https://discord.gg/uCQEnRaSMG


To be continued in the future
Threat Hunting Series

You will learn how to improve the threat hunting system in large-scale infrastructure environments by utilizing Ansible and other tools, and sequentially learn threat hunting methods that reflect recent issues such as detailed rule sets and new malware.

Recommended for
these people

Who is this course right for?

  • For those with basic knowledge of building a security environment who want to challenge themselves with building an advanced threat hunting system: This course allows you to systematically learn from basic security knowledge to advanced threat hunting systems through hands-on practice.

  • For IT and security managers who want to strengthen their security infrastructure in a corporate environment: This is suitable for those who want to upgrade the security of their corporate environment by learning how to detect and respond to threats through real-world attack scenarios.

  • For those interested in security tools like Sysmon and Suricata: You can deeply explore how to use these tools and how to efficiently operate a security system.

  • For job seekers and students aspiring to become security experts: This is especially recommended for those who want to develop the security skill sets needed in the field. This course covers core content that can enhance your competitiveness in the security field.

Need to know before starting?

  • Basic security knowledge: A basic understanding of basic attack types, security terms, and security philosophy will make it easier to absorb the lecture content.

  • Linux Basic Operating Knowledge: The course covers system construction and operation in a Linux environment, so you should be familiar with basic Linux commands and environment settings.

  • Log Management and Analysis: Basic knowledge of the structure and analysis methods of log files will be of great help in threat detection and analysis covered in the lecture.

  • Basic network knowledge: Requires basic understanding of OSI 7 Layer, TCP/IP, and major protocols and ports.

Hello
This is

464

Learners

14

Reviews

55

Answers

4.9

Rating

2

Courses

('24.10월 기준 최종합격자 : 140명, 합격기업수 : 84곳)

전문성을 기반으로 빠른 취업 성공을 목표로 진행합니다.
미래에 대응할 수 있는 IT 경력 개발을 제안합니다.

취업폭격기 제로미니 수강생 최종 합격 현황

한국은행, 금융보안원, 한국산업은행, 한국예탁결제원, 한전KDN, 한국남부발전, 한국지능정보사회진흥원, 한국가스공사, 중소벤처기업진흥공단, 한국공항공사, 한국지역정보개발원, 코스콤, 한국철도공사, 한국전력공사, 한국수자원공사, 인천교통공사, 인천국제공항공사, 국립대병원, 한국수출입은행, 한국고용정보원, 한국주택금융공사, 신용보증재단중앙회, 한국어촌어항공단, 공무원연금공단, 기술보증기금, 삼성증권, 네이버클라우드, 한국도로공사, 한국농어촌공사, 금융결제원, 농협은행, 대학교 전산교직원, 한국해운조합, 경상국립대학교병원, 한국중부발전, 아워홈, 주택도시보증공사, 한국재정정보원, 한국남동발전, 농협정보시스템, 한국관광공사, 한국무역보험공사, 한국국토정보공사, 한국교육학술정보원, 한국자산관리공사, 건강보험심사평가원, 한국원자력환경공단, 서울보증보험, 국민건강보험공단, KT, 한국해양진흥공사, 국토안전관리원, 한국산업인력공단, 우리은행, 전북은행, 교보정보통신, 서울디자인재단, 부산대학교병원, 금융감독원, 한국에너지공단, 서울시설공단, 한국교직원공제회, 대전관광공사, 농수산식품유통공사, 우리금융캐피탈, 대한적십자사, 중소기업유통센터, 한국산업단지공단, 여신금융협회, 한국사회보장정보원, 한국보건의료인국가시험원, 한국벤처투자, 공항철도, 한국기초과학연구원, 전략물자관리원, 한국토지주택공사, 국민연금공단, 경기신용보증재단, 하남도시공사, 한국전력거래소

Curriculum

All

24 lectures ∙ (6hr 2min)

Course Materials:

Lecture resources
Published: 
Last updated: 

Reviews

All

7 reviews

4.9

7 reviews

  • 정연수님의 프로필 이미지
    정연수

    Reviews 1

    Average Rating 5.0

    5

    86% enrolled

    • 양마에님의 프로필 이미지
      양마에

      Reviews 2

      Average Rating 4.5

      4

      100% enrolled

      • 양경근님의 프로필 이미지
        양경근

        Reviews 3

        Average Rating 5.0

        5

        33% enrolled

        • 최태림님의 프로필 이미지
          최태림

          Reviews 16

          Average Rating 5.0

          5

          33% enrolled

          • 박상길님의 프로필 이미지
            박상길

            Reviews 9

            Average Rating 4.6

            5

            100% enrolled

            $59.40

            zeromini's other courses

            Check out other courses by the instructor!

            Similar courses

            Explore other courses in the same field!