Search Results
Zeek in Action, Video 16, Interpreting Cyber Threat Intelligence Reports
Zeek in Action, Video 15, Revisiting NetFlow and Zeek Data
Cyber Threat Intelligence - Reports
Zeek in Action, Video 14, Comparing Zeek Connection Logs with NetFlow Records
Zeek in Action, Video 10, Examining the Four Types of Network Security Monitoring Data
Analyzing Chinese Information Operations with Threat Intelligence
Threat Intel for Everyone: Writing Like A Journalist To Produce Clear, Concise Reports
Ensuring Network Security with Zeek - Course Overview
A|C – Getting the Details From Zeek | Bill Stearns & Keith Chew | 1 Hour
ZeekWeek 2022 - Zeek Known Services Classification - Fatema Bannat Wala
지크(Zeek) - Forgive
How to Find Lateral Movement and Reduce Dwell Times with Zeek, MITRE ATT&CK™ and the BZAR Project