SlideShare a Scribd company logo
Learn intrusion detection: Using Zeek and Elastic for incident response
Meet the
panel
Infosec Skills author &
Founder of Enigma Networkz
Jeff Peters
Director of Content Marketing
Infosec
Mark Viglione
Today’s
webcast
⮚ Intrusion detection overview
⮚ MITRE ATT&CK and intrusion detection
⮚ Intrusion detection demo
⮚ Use case
⮚ Tools
⮚ Zeek demo
⮚ Elastic demo
⮚ Q&A
More cybersecurity training resources
Learn intrusion detection with Mark Viglione
⮚ Advanced Intrusion Detection learning path
⮚ Read Mark’s intrusion detection blogs
Free resources from Infosec
⮚ Create your free Infosec Skills account
⮚ Infosec Skills Monthly Challenge
⮚ Infosec YouTube channel
⮚ Infosec Accelerate Scholarship
Intrusion detection overview
Intrusion detection is a way to
detect if any unauthorized activity
is occurring on your network or any
of your endpoints/systems.
Jobs that require IDS
knowledge and skills:
⮚ SOC analyst
⮚ Cybersecurity analyst
⮚ Cyber threat hunter
⮚ Network security
engineer
⮚ Systems engineer
⮚ Penetration tester
Intrusion detection overview: 3 types
Signature-based detection
involves detecting
previously known
vulnerabilities and attacks
Rule-based detection
uses a set of rules to
determine whether an
activity is suspicious
Anomaly detection
uses methods like
machine learning to
detect previously
unknown threats
MITRE ATT&K and intrusion detection
Intrusion detection demo: Use case and tools
Intrusion detection example
⮚ Generating Zeek logs from Brim
⮚ Uploading to Elastic, an open-
source security information and
event management (SIEM) tool
⮚ Exploring the data, walking
through a dashboard and
setting up detections
Demo
Intrusion detection: What’s next?
Visibility is crucial for blue teams and network
defenders. You set up the rule. Now what?
⮚ Tuning: Huge part of building valuable detections
⮚ Alert fatigue: Prioritizing alerts/detections
⮚ Choice of tools: Many different tools, how to
choose?
Questions?
15 scholarships. 5 categories. $225,000+ value.
Learn cybersecurity with Infosec Skills
Infosec Skills subscription:
➢ 190+ role-based learning paths (e.g., Ethical Hacking,
Digital Forensics, Advanced Intrusion Detection)
➢ 100s of hands-on labs in cloud-hosted cyber ranges
➢ Custom certification practice exams and skill
assessments aligned to key cybersecurity roles
Infosec Skills live boot camp:
➢ Live, instructor-led training (in-person or live online)
➢ Free annual Infosec Skills subscription
➢ 1-year extended access to all boot camp video replays
and materials
➢ Exam voucher and Exam Pass Guarantee
infosecinstitute.com/skills
Free year of Infosec Skills
And the winner for a
one-year subscription to
Infosec Skills is …
infosecinstitute.com/skills
(Valued at $599)
About us
Infosec believes knowledge is power when fighting
cybercrime. We help IT and security professionals advance
their careers with skills development and certifications
while empowering all employees with security awareness
and privacy training to stay cyber-safe at work and home.
www.infosecinstitute.com

More Related Content

PDF
Splunk-Presentation
PPTX
Threat hunting foundations: People, process and technology.pptx
PPTX
Threat Hunting with Splunk
PPTX
SIEM - Your Complete IT Security Arsenal
PPTX
Threat hunting - Every day is hunting season
PPTX
SIEM Primer:
PPTX
SOC Cyber Security
PDF
Security operations center-SOC Presentation-مرکز عملیات امنیت
Splunk-Presentation
Threat hunting foundations: People, process and technology.pptx
Threat Hunting with Splunk
SIEM - Your Complete IT Security Arsenal
Threat hunting - Every day is hunting season
SIEM Primer:
SOC Cyber Security
Security operations center-SOC Presentation-مرکز عملیات امنیت

What's hot (20)

PDF
SIEM and Threat Hunting
PPTX
Threat Hunting with Splunk
PDF
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
PPTX
Bsides 2019 - Intelligent Threat Hunting
PPTX
Role of Forensic Triage In Cyber Security Trends 2021
PPSX
Next-Gen security operation center
PPTX
Join the hunt: Threat hunting for proactive cyber defense.pptx
PPTX
Cybersecurity Training for Nonprofits
PDF
Threat Hunting with Splunk
PPTX
IBM Security QRadar
PDF
Splunk Data Onboarding Overview - Splunk Data Collection Architecture
PDF
From SIEM to SOC: Crossing the Cybersecurity Chasm
PPTX
Threat hunting for Beginners
PPTX
Security Information Event Management - nullhyd
PPTX
Roadmap to security operations excellence
PDF
Building a Next-Generation Security Operations Center (SOC)
PDF
SIEM Architecture
PPTX
Cyber Threat Hunting with Phirelight
PPT
Firewall Architecture
PPTX
Continuous monitoring with OSSIM
SIEM and Threat Hunting
Threat Hunting with Splunk
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
Bsides 2019 - Intelligent Threat Hunting
Role of Forensic Triage In Cyber Security Trends 2021
Next-Gen security operation center
Join the hunt: Threat hunting for proactive cyber defense.pptx
Cybersecurity Training for Nonprofits
Threat Hunting with Splunk
IBM Security QRadar
Splunk Data Onboarding Overview - Splunk Data Collection Architecture
From SIEM to SOC: Crossing the Cybersecurity Chasm
Threat hunting for Beginners
Security Information Event Management - nullhyd
Roadmap to security operations excellence
Building a Next-Generation Security Operations Center (SOC)
SIEM Architecture
Cyber Threat Hunting with Phirelight
Firewall Architecture
Continuous monitoring with OSSIM
Ad

Similar to Learn intrusion detection: Using Zeek and Elastic for incident response (20)

PPTX
How to do application security right
PPTX
Skills training value: How to differentiate your staff and your organization ...
PDF
Managing Information Security Second Edition John R. Vacca
PPTX
List of intrusion detection systems, its types and its importance
PDF
Managing Information Security Second Edition John R. Vacca
PPTX
Intrusion Detection Systems Pedagogy.pptx
PPTX
Insider threat v3
PPTX
Cyber Threat Hunting: Identify and Hunt Down Intruders
PPT
ch08.ppt
PPTX
Big data security
PPTX
The Hidden Enemy Within - Why Ungoverned Data is Such a Big Problem
PPTX
Webinar: Will the Real AI Please Stand Up?
PDF
Journey to the Center of Security Operations
PPTX
computer security principles and practice chapter 8
PPTX
Get started in cybersecurity in 2022
PPT
Intrusion Detection Systems
PPTX
Combating Insider Threats – Protecting Your Agency from the Inside Out
PDF
Infographic: Inside Data Breaches
PPT
Data Mining and Intrusion Detection
PPT
Bulletproof IT Security
How to do application security right
Skills training value: How to differentiate your staff and your organization ...
Managing Information Security Second Edition John R. Vacca
List of intrusion detection systems, its types and its importance
Managing Information Security Second Edition John R. Vacca
Intrusion Detection Systems Pedagogy.pptx
Insider threat v3
Cyber Threat Hunting: Identify and Hunt Down Intruders
ch08.ppt
Big data security
The Hidden Enemy Within - Why Ungoverned Data is Such a Big Problem
Webinar: Will the Real AI Please Stand Up?
Journey to the Center of Security Operations
computer security principles and practice chapter 8
Get started in cybersecurity in 2022
Intrusion Detection Systems
Combating Insider Threats – Protecting Your Agency from the Inside Out
Infographic: Inside Data Breaches
Data Mining and Intrusion Detection
Bulletproof IT Security
Ad

More from Infosec (20)

PPTX
CompTIA PenTest+ is changing in 2025: Everything you need to know
PPTX
Bridging the gap From security awareness training to human risk management - ...
PPTX
How to stay relevant as a cyber professional: Skills, trends and career paths...
PPTX
AWS Certified DevOps Engineer: What it is and how to get certified
PPTX
AWS Cloud Operations Administrator: What it is and how to get certified
PPTX
AWS Certified Security - Specialty: What it is and how to get certified
PPTX
AWS Certified Solutions Architect Webinar.pptx
PPTX
Infosec and AWS - A new way to train for your AWS certification (1).pptx
PPTX
How AI and ChatGPT are changing cybersecurity forever.pptx
PPTX
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
PPTX
NCSAM 2023 Webinar.pptx
PPTX
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
PDF
Learning ≠ Education: How people really learn and what it means for security ...
PPTX
Security awareness training - 4 topics that matter most
PPTX
A public discussion about privacy careers: Training, certification and experi...
PDF
CompTIA PenTest+: Everything you need to know about the exam
PPTX
CompTIA CASP+ | Everything you need to know about the new exam
PPTX
CompTIA network+ | Everything you need to know about the new exam
PPTX
Isaca career paths - the highest paying certifications in the industry
PDF
CMMC case study: Inside a CMMC assessment
CompTIA PenTest+ is changing in 2025: Everything you need to know
Bridging the gap From security awareness training to human risk management - ...
How to stay relevant as a cyber professional: Skills, trends and career paths...
AWS Certified DevOps Engineer: What it is and how to get certified
AWS Cloud Operations Administrator: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Solutions Architect Webinar.pptx
Infosec and AWS - A new way to train for your AWS certification (1).pptx
How AI and ChatGPT are changing cybersecurity forever.pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
NCSAM 2023 Webinar.pptx
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
Learning ≠ Education: How people really learn and what it means for security ...
Security awareness training - 4 topics that matter most
A public discussion about privacy careers: Training, certification and experi...
CompTIA PenTest+: Everything you need to know about the exam
CompTIA CASP+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new exam
Isaca career paths - the highest paying certifications in the industry
CMMC case study: Inside a CMMC assessment

Recently uploaded (20)

PDF
Modernizing your data center with Dell and AMD
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
KodekX | Application Modernization Development
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Empathic Computing: Creating Shared Understanding
PDF
Approach and Philosophy of On baking technology
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Encapsulation theory and applications.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
Modernizing your data center with Dell and AMD
20250228 LYD VKU AI Blended-Learning.pptx
Electronic commerce courselecture one. Pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
The Rise and Fall of 3GPP – Time for a Sabbatical?
Advanced methodologies resolving dimensionality complications for autism neur...
Building Integrated photovoltaic BIPV_UPV.pdf
KodekX | Application Modernization Development
NewMind AI Monthly Chronicles - July 2025
Empathic Computing: Creating Shared Understanding
Approach and Philosophy of On baking technology
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Encapsulation_ Review paper, used for researhc scholars
NewMind AI Weekly Chronicles - August'25 Week I
Reach Out and Touch Someone: Haptics and Empathic Computing
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Encapsulation theory and applications.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Understanding_Digital_Forensics_Presentation.pptx
Per capita expenditure prediction using model stacking based on satellite ima...

Learn intrusion detection: Using Zeek and Elastic for incident response

  • 2. Meet the panel Infosec Skills author & Founder of Enigma Networkz Jeff Peters Director of Content Marketing Infosec Mark Viglione
  • 3. Today’s webcast ⮚ Intrusion detection overview ⮚ MITRE ATT&CK and intrusion detection ⮚ Intrusion detection demo ⮚ Use case ⮚ Tools ⮚ Zeek demo ⮚ Elastic demo ⮚ Q&A
  • 4. More cybersecurity training resources Learn intrusion detection with Mark Viglione ⮚ Advanced Intrusion Detection learning path ⮚ Read Mark’s intrusion detection blogs Free resources from Infosec ⮚ Create your free Infosec Skills account ⮚ Infosec Skills Monthly Challenge ⮚ Infosec YouTube channel ⮚ Infosec Accelerate Scholarship
  • 5. Intrusion detection overview Intrusion detection is a way to detect if any unauthorized activity is occurring on your network or any of your endpoints/systems. Jobs that require IDS knowledge and skills: ⮚ SOC analyst ⮚ Cybersecurity analyst ⮚ Cyber threat hunter ⮚ Network security engineer ⮚ Systems engineer ⮚ Penetration tester
  • 6. Intrusion detection overview: 3 types Signature-based detection involves detecting previously known vulnerabilities and attacks Rule-based detection uses a set of rules to determine whether an activity is suspicious Anomaly detection uses methods like machine learning to detect previously unknown threats
  • 7. MITRE ATT&K and intrusion detection
  • 8. Intrusion detection demo: Use case and tools Intrusion detection example ⮚ Generating Zeek logs from Brim ⮚ Uploading to Elastic, an open- source security information and event management (SIEM) tool ⮚ Exploring the data, walking through a dashboard and setting up detections Demo
  • 9. Intrusion detection: What’s next? Visibility is crucial for blue teams and network defenders. You set up the rule. Now what? ⮚ Tuning: Huge part of building valuable detections ⮚ Alert fatigue: Prioritizing alerts/detections ⮚ Choice of tools: Many different tools, how to choose?
  • 11. 15 scholarships. 5 categories. $225,000+ value.
  • 12. Learn cybersecurity with Infosec Skills Infosec Skills subscription: ➢ 190+ role-based learning paths (e.g., Ethical Hacking, Digital Forensics, Advanced Intrusion Detection) ➢ 100s of hands-on labs in cloud-hosted cyber ranges ➢ Custom certification practice exams and skill assessments aligned to key cybersecurity roles Infosec Skills live boot camp: ➢ Live, instructor-led training (in-person or live online) ➢ Free annual Infosec Skills subscription ➢ 1-year extended access to all boot camp video replays and materials ➢ Exam voucher and Exam Pass Guarantee infosecinstitute.com/skills
  • 13. Free year of Infosec Skills And the winner for a one-year subscription to Infosec Skills is … infosecinstitute.com/skills (Valued at $599)
  • 14. About us Infosec believes knowledge is power when fighting cybercrime. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and privacy training to stay cyber-safe at work and home. www.infosecinstitute.com