Additionally, paste this code immediately after the opening tag:

In this episode of Zeek in Action, Richard examines the four types of network security monitoring data: 1) full content data (“PCAP”), 2) transaction logs, 3) extracted content, and 4) intrusion detection systems (IDS) alerts. He uses the online tool Cloudshark to examine all four types and to compare and contrast the strengths and weaknesses of each.

If you would like to follow along, please check out our Zeek in Action playlist on the Zeek YouTube Channel.

If you would like to discuss the video, or consider creating one yourself, please visit the Zeek community Slack workspace and join the #documentation channel.

%d bloggers like this: