HackPathHackPath
CoursesRoadmapPracticePricing
>_
HackerPath

Blue Team Ops — Detect, Block, Respond

0%
Lessons
Monitoring & Detection
01Read and analyze system logs
40 min
02Detect an Nmap Scan in Firewall Logs
35 min
03fail2ban — Automatically Banning Attackers
45 min
04Harden a Server with UFW and iptables
50 min
IDS/IPS with Suricata
05Introduction to IDS/IPS — Understanding Network Detection
40 min
06Installing and Configuring Suricata
50 min
07Write Your Own Suricata Detection Rules
50 min
Centralized Logging with ELK
08Introduction to SIEM — Why Centralize Logs
35 min
09Set Up the ELK Stack
60 min
10Create Security Alerts and Dashboards in Kibana
50 min
Forensics & Incident Response
11Forensic Analysis of a Compromised System
55 min
12Recover Deleted Data with Autopsy and Foremost
50 min
13Write a Professional Incident Report
45 min

Lesson 07

Write Your Own Suricata Detection Rules

Learn Suricata rule syntax and create your own custom detection rules for attacks specific to your infrastructure.

Locked lesson

This lesson is reserved for members. Upgrade to unlock the full course.

Upgrade