Free
Getting Started with ELK Stack: Overview
If you are a SOC Analyst, IT Admin, or just someone looking to protect your home network, it is beneficial to know how to use Elastic’s free community ELK Stack for Security. Learn what the ELK Stack is and how to navigate its interface in this primer that prepares you for Cybrary’s other courses that feature the ELK Stack.
1
H
18
M
Time
intermediate
difficulty
2
ceu/cpe
Course Content
Familiarization with the ELK Stack Interface Part 1
Familiarization with the ELK Stack Interface
What Is the ELK Stack and How Can It Be Used?
Introduction to the Elastic ELK Stack
Familiarization with the ELK Stack Interface Part 2
Familiarization with the ELK Stack Interface
How the ELK Stack Works
Introduction to the Elastic ELK Stack
Lab: Explore the ELK Stack Interface
Familiarization with the ELK Stack Interface
Course Description
If you are a SOC Analyst, IT Admin, or just someone looking to protect your home network, it is beneficial to know how to use Elastic’s free community ELK Stack for Security. Learn what the ELK Stack is and how to navigate its interface in this primer that prepares you for Cybrary’s other courses that feature the ELK Stack.
Who should take this course?
The target audience for this training is individuals who work in a Network Security role or Administration who may be interested in implementing the Elastic ELK stack into their environment. This training is also intended for entry-level SOC analysts who may be using ELK.What are the prerequisites for this course?
This training assumes you have a foundational knowledge of TCP/IP networking, ports and protocols, and Linux and Windows fundamentals.Why take this course?
What makes this course so beneficial is that you will learn what makes ELK Stack an affordable and flexible SIEM solution that can serve many use cases. In this course, you will get hands-on experience navigating and using ELK Stack as a SIEM. This will prepare you to take other courses in the series where you will create custom queries and alerts, configure dashboards, and configure a Beats agent to forward your logs to ELK. You will also be prepared to take the capstone lab in this series, where you will use ELK to detect malicious activity in a realistic threat-hunting scenario. These subsequent courses will be released over time, so be sure to check back for them if you don't see them on the Cybrary platform right away.What makes this course different from others?
By the end of this course, you should be able to:Your instructor, Skyler Gehman, is a Cyber Operations Specialist in the Army. He is a graduate of the Joint Cyber Analysis Course at the Navy's Center for Information Warfare and the Army's Cyber Center of Excellence for Offensive and Defensive Cyberspace Operations. He has also worked in the manufacturing of military electronics and weapons systems.