Description
Learn to use Elastic Stack, Datadog, and Graylog to collect data and analyze logs and security events to effectively detect threats before an exploit occurs. You’ll also learn how to build your own threat-hunting lab and use Kibana to visualize and explore data and find adversaries.
Reviews
There are no reviews yet.