Zaloguj się bądź zarejestruj
Build a Network Threat Hunting Project with Ansible & Python
Started by OneDDL


Rate this topic
  • 0 głosów - średnia: 0
  • 1
  • 2
  • 3
  • 4
  • 5


0 posts in this topic
OneDDL
Doświadczony Senior
****


0
1 121 posts 1 121 threads Dołączył: Jan 2026
Dzisiaj, 00:30 -
#1
[Obrazek: 48476159ae304eabf83746cea8e22ade.webp]
Free Download Build a Network Threat Hunting Project with Ansible & Python
Published 1/2026
Created by Mihai Cătălin Teodosiu
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz, 2 Ch
Level: All | Genre: eLearning | Language: English | Duration: 55 Lectures ( 4h 15m ) | Size: 2.3 GB

Recruiters want results! Show them your network threat-hunting project with Zeek, Suricata, Python, MMdb, and Ansible.
What you'll learn
✓ Use Ansible to automate and orchestrate a PCAP analysis pipeline.
✓ Use Zeek and Suricata for deep PCAP analysis and log generation.
✓ Use Python code and MMdb to enrich the pipeline's functionality.
✓ Use Python to correlate all logs and alerts, and generate reports.
✓ Learn how to design and build an end-to-end analysis pipeline.
✓ Build a complete, 100% hands-on project to showcase to recruiters.
Requirements
● You should have a basic understanding of networking: TCP/IP, UDP, HTTP, DNS, etc.
● You should have a basic understanding of Python: syntax, data types, functions, libraries.
● All tools used in this course are 100% free - you won't be required to purchase anything.
● You need a decent PC and be able to assign 4GB RAM and 25GB disk space to the VM.
Description
Recruiters want results. Managers, too. They value builders and doers - not just theoreticians.
Show them your own hands-on threat-hunting lab for network traffic analysis, built around a fully automated pipeline using the following tools and technologies
• Zeek - deep PCAP analysis and context-rich security logs
• Suricata - detection based on pre-defined rules and signatures
• Ansible - automation and orchestration of the analysis pipeline
• Python - for building custom scripts and enriching functionality
• MMdb - for adding IP geolocation and ASN-related information
• VS Code - used for organizing all of our project files and folders
• Ubuntu - base operating system for the traffic analysis pipeline
• VirtualBox - used for virtualization and isolation purposes
During this course, you'll build a fully automated network traffic analysis pipeline that ingests PCAP files, runs in-depth analysis from multiple angles, generates actionable logs and alerts - as well as a Markdown report summary, and helps uncover unusual or malicious behavior in your network.
• We're going to build the project together from the ground up, step-by-step
• You will install, execute, code, and also troubleshoot everything alongside me
By the end, you'll have a threat-hunting lab that you can actually use in the real world for
• Becoming a better Network Engineer or Security Analyst
• Showcasing a strong project to companies and recruiters
• Monitoring and securing your own home network traffic
This project is a perfect fit if you're looking to showcase your skills as a
• Network Engineer or Network Security Analyst
• Network Automation Engineer or QA Engineer
• Network Detection and Response Engineer
• SOC Analyst, SOC Engineer
• Threat Hunting Engineer
Time is ticking - don't waste it! Start building.
Enroll now, and I'll see you in the first lecture.
Who this course is for
■ Network Administrators, Network Engineers, Network Analysts, Systems Engineers.
■ Network QA Engineers, Network Automation Engineers, Network Security Engineers.
■ Python enthusiasts who want to apply their knowledge to Network Automation.
■ Any other kind of IT, security, or networking geeks are welcome, as well.
Homepage
Kod:
https://www.udemy.com/course/threat-hunting/
Published 1/2026
Created by Mihai Cătălin Teodosiu
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz, 2 Ch
Level: All | Genre: eLearning | Language: English | Duration: 55 Lectures ( 4h 15m ) | Size: 2.3 GB
Recruiters want results! Show them your network threat-hunting project with Zeek, Suricata, Python, MMdb, and Ansible.
What you'll learn
✓ Use Ansible to automate and orchestrate a PCAP analysis pipeline.
✓ Use Zeek and Suricata for deep PCAP analysis and log generation.
✓ Use Python code and MMdb to enrich the pipeline's functionality.
✓ Use Python to correlate all logs and alerts, and generate reports.
✓ Learn how to design and build an end-to-end analysis pipeline.
✓ Build a complete, 100% hands-on project to showcase to recruiters.
Requirements
● You should have a basic understanding of networking: TCP/IP, UDP, HTTP, DNS, etc.
● You should have a basic understanding of Python: syntax, data types, functions, libraries.
● All tools used in this course are 100% free - you won't be required to purchase anything.
● You need a decent PC and be able to assign 4GB RAM and 25GB disk space to the VM.
Description
Recruiters want results. Managers, too. They value builders and doers - not just theoreticians.
Show them your own hands-on threat-hunting lab for network traffic analysis, built around a fully automated pipeline using the following tools and technologies
• Zeek - deep PCAP analysis and context-rich security logs
• Suricata - detection based on pre-defined rules and signatures
• Ansible - automation and orchestration of the analysis pipeline
• Python - for building custom scripts and enriching functionality
• MMdb - for adding IP geolocation and ASN-related information
• VS Code - used for organizing all of our project files and folders
• Ubuntu - base operating system for the traffic analysis pipeline
• VirtualBox - used for virtualization and isolation purposes
During this course, you'll build a fully automated network traffic analysis pipeline that ingests PCAP files, runs in-depth analysis from multiple angles, generates actionable logs and alerts - as well as a Markdown report summary, and helps uncover unusual or malicious behavior in your network.
• We're going to build the project together from the ground up, step-by-step
• You will install, execute, code, and also troubleshoot everything alongside me
By the end, you'll have a threat-hunting lab that you can actually use in the real world for
• Becoming a better Network Engineer or Security Analyst
• Showcasing a strong project to companies and recruiters
• Monitoring and securing your own home network traffic
This project is a perfect fit if you're looking to showcase your skills as a
• Network Engineer or Network Security Analyst
• Network Automation Engineer or QA Engineer
• Network Detection and Response Engineer
• SOC Analyst, SOC Engineer
• Threat Hunting Engineer
Time is ticking - don't waste it! Start building.
Enroll now, and I'll see you in the first lecture.
Who this course is for
■ Network Administrators, Network Engineers, Network Analysts, Systems Engineers.
■ Network QA Engineers, Network Automation Engineers, Network Security Engineers.
■ Python enthusiasts who want to apply their knowledge to Network Automation.
■ Any other kind of IT, security, or networking geeks are welcome, as well.
Homepage
Kod:
https://www.udemy.com/course/threat-hunting/

Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live

DDownload
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part1.rar
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part2.rar
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part3.rar
Rapidgator
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part1.rar.html
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part2.rar.html
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part3.rar.html
AlfaFile
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part1.rar
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part2.rar
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part3.rar

FreeDL
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part1.rar.html
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part2.rar.html
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part3.rar.html

No Password - Links are Interchangeable


Skocz do:


Użytkownicy przeglądający ten wątek: 1 gości