|
Build a Network Threat Hunting Project with Ansible & Python - Wersja do druku +- SpeedwayHero - forum (https://speedwayhero.com/forum) +-- Dział: Forum Główne (https://speedwayhero.com/forum/forumdisplay.php?fid=1) +--- Dział: Propozycje (https://speedwayhero.com/forum/forumdisplay.php?fid=5) +--- Wątek: Build a Network Threat Hunting Project with Ansible & Python (/showthread.php?tid=78151) |
Build a Network Threat Hunting Project with Ansible & Python - OneDDL - 20-01-2026 ![]() Free Download Build a Network Threat Hunting Project with Ansible & Python Published 1/2026 Created by Mihai Cătălin Teodosiu MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz, 2 Ch Level: All | Genre: eLearning | Language: English | Duration: 55 Lectures ( 4h 15m ) | Size: 2.3 GB Recruiters want results! Show them your network threat-hunting project with Zeek, Suricata, Python, MMdb, and Ansible. What you'll learn ✓ Use Ansible to automate and orchestrate a PCAP analysis pipeline. ✓ Use Zeek and Suricata for deep PCAP analysis and log generation. ✓ Use Python code and MMdb to enrich the pipeline's functionality. ✓ Use Python to correlate all logs and alerts, and generate reports. ✓ Learn how to design and build an end-to-end analysis pipeline. ✓ Build a complete, 100% hands-on project to showcase to recruiters. Requirements ● You should have a basic understanding of networking: TCP/IP, UDP, HTTP, DNS, etc. ● You should have a basic understanding of Python: syntax, data types, functions, libraries. ● All tools used in this course are 100% free - you won't be required to purchase anything. ● You need a decent PC and be able to assign 4GB RAM and 25GB disk space to the VM. Description Recruiters want results. Managers, too. They value builders and doers - not just theoreticians. Show them your own hands-on threat-hunting lab for network traffic analysis, built around a fully automated pipeline using the following tools and technologies • Zeek - deep PCAP analysis and context-rich security logs • Suricata - detection based on pre-defined rules and signatures • Ansible - automation and orchestration of the analysis pipeline • Python - for building custom scripts and enriching functionality • MMdb - for adding IP geolocation and ASN-related information • VS Code - used for organizing all of our project files and folders • Ubuntu - base operating system for the traffic analysis pipeline • VirtualBox - used for virtualization and isolation purposes During this course, you'll build a fully automated network traffic analysis pipeline that ingests PCAP files, runs in-depth analysis from multiple angles, generates actionable logs and alerts - as well as a Markdown report summary, and helps uncover unusual or malicious behavior in your network. • We're going to build the project together from the ground up, step-by-step • You will install, execute, code, and also troubleshoot everything alongside me By the end, you'll have a threat-hunting lab that you can actually use in the real world for • Becoming a better Network Engineer or Security Analyst • Showcasing a strong project to companies and recruiters • Monitoring and securing your own home network traffic This project is a perfect fit if you're looking to showcase your skills as a • Network Engineer or Network Security Analyst • Network Automation Engineer or QA Engineer • Network Detection and Response Engineer • SOC Analyst, SOC Engineer • Threat Hunting Engineer Time is ticking - don't waste it! Start building. Enroll now, and I'll see you in the first lecture. Who this course is for ■ Network Administrators, Network Engineers, Network Analysts, Systems Engineers. ■ Network QA Engineers, Network Automation Engineers, Network Security Engineers. ■ Python enthusiasts who want to apply their knowledge to Network Automation. ■ Any other kind of IT, security, or networking geeks are welcome, as well. Homepage Kod: https://www.udemy.com/course/threat-hunting/Created by Mihai Cătălin Teodosiu MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz, 2 Ch Level: All | Genre: eLearning | Language: English | Duration: 55 Lectures ( 4h 15m ) | Size: 2.3 GB Recruiters want results! Show them your network threat-hunting project with Zeek, Suricata, Python, MMdb, and Ansible. What you'll learn ✓ Use Ansible to automate and orchestrate a PCAP analysis pipeline. ✓ Use Zeek and Suricata for deep PCAP analysis and log generation. ✓ Use Python code and MMdb to enrich the pipeline's functionality. ✓ Use Python to correlate all logs and alerts, and generate reports. ✓ Learn how to design and build an end-to-end analysis pipeline. ✓ Build a complete, 100% hands-on project to showcase to recruiters. Requirements ● You should have a basic understanding of networking: TCP/IP, UDP, HTTP, DNS, etc. ● You should have a basic understanding of Python: syntax, data types, functions, libraries. ● All tools used in this course are 100% free - you won't be required to purchase anything. ● You need a decent PC and be able to assign 4GB RAM and 25GB disk space to the VM. Description Recruiters want results. Managers, too. They value builders and doers - not just theoreticians. Show them your own hands-on threat-hunting lab for network traffic analysis, built around a fully automated pipeline using the following tools and technologies • Zeek - deep PCAP analysis and context-rich security logs • Suricata - detection based on pre-defined rules and signatures • Ansible - automation and orchestration of the analysis pipeline • Python - for building custom scripts and enriching functionality • MMdb - for adding IP geolocation and ASN-related information • VS Code - used for organizing all of our project files and folders • Ubuntu - base operating system for the traffic analysis pipeline • VirtualBox - used for virtualization and isolation purposes During this course, you'll build a fully automated network traffic analysis pipeline that ingests PCAP files, runs in-depth analysis from multiple angles, generates actionable logs and alerts - as well as a Markdown report summary, and helps uncover unusual or malicious behavior in your network. • We're going to build the project together from the ground up, step-by-step • You will install, execute, code, and also troubleshoot everything alongside me By the end, you'll have a threat-hunting lab that you can actually use in the real world for • Becoming a better Network Engineer or Security Analyst • Showcasing a strong project to companies and recruiters • Monitoring and securing your own home network traffic This project is a perfect fit if you're looking to showcase your skills as a • Network Engineer or Network Security Analyst • Network Automation Engineer or QA Engineer • Network Detection and Response Engineer • SOC Analyst, SOC Engineer • Threat Hunting Engineer Time is ticking - don't waste it! Start building. Enroll now, and I'll see you in the first lecture. Who this course is for ■ Network Administrators, Network Engineers, Network Analysts, Systems Engineers. ■ Network QA Engineers, Network Automation Engineers, Network Security Engineers. ■ Python enthusiasts who want to apply their knowledge to Network Automation. ■ Any other kind of IT, security, or networking geeks are welcome, as well. Homepage Kod: https://www.udemy.com/course/threat-hunting/Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live DDownload xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part1.rar xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part2.rar xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part3.rar Rapidgator xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part1.rar.html xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part2.rar.html xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part3.rar.html AlfaFile xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part1.rar xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part2.rar xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part3.rar FreeDL xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part1.rar.html xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part2.rar.html xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part3.rar.html No Password - Links are Interchangeable |