* Cantinho Satkeys

Refresh History
  • nsama71: uhf
    11 de Maio de 2026, 05:57
  • FELISCUNHA: ghyt74  votos de um santo domingo para todo o auditório  4tj97u<z
    10 de Maio de 2026, 11:02
  • j.s.: bom fim de semana   4tj97u<z
    09 de Maio de 2026, 20:41
  • j.s.: try65hytr a todos  49E09B4F 49E09B4F
    09 de Maio de 2026, 20:41
  • FELISCUNHA: ghyt74  Pessoal  49E09B4F
    08 de Maio de 2026, 11:39
  • JP: try65hytr A Todos  4tj97u<z 2dgh8i k7y8j0 yu7gh8
    08 de Maio de 2026, 05:50
  • JP: try65hytr Pessoal  4tj97u<z 2dgh8i k7y8j0
    07 de Maio de 2026, 05:23
  • j.s.: dgtgtr a todos  49E09B4F 49E09B4F
    05 de Maio de 2026, 16:34
  • FELISCUNHA: ghyt74  pessoal   49E09B4F
    04 de Maio de 2026, 11:28
  • cereal killa: forever   2Slb& 2Slb&
    03 de Maio de 2026, 22:19
  • henrike: 2Slb&
    03 de Maio de 2026, 14:17
  • FELISCUNHA: Votos de um santo domingo para todo o auditório  4Fcp&
    03 de Maio de 2026, 11:23
  • cereal killa: dgtgtr pessoal  wwd46l0' 4tj97u<z
    01 de Maio de 2026, 12:22
  • JP: try65hytr A Todos  4tj97u<z classic 2dgh8i k7y8j0
    01 de Maio de 2026, 05:05
  • FELISCUNHA: ghyt74  pessoal   49E09B4F
    30 de Abril de 2026, 11:12
  • JP: try65hytr Pessoal 4tj97u<z k7y8j0 yu7gh8
    30 de Abril de 2026, 05:52
  • j.s.: dgtgtr a todos  49E09B4F
    28 de Abril de 2026, 16:09
  • FELISCUNHA: ghyt74  pessoal   49E09B4F
    24 de Abril de 2026, 11:01
  • JP: try65hytr A Todos  k7y8j0 classic
    24 de Abril de 2026, 04:11
  • JP: try65hytr Pessoal  4tj97u<z 2dgh8i k7y8j0 yu7gh8
    23 de Abril de 2026, 05:46

Autor Tópico: Build a Network Threat Hunting Project with Ansible & Python  (Lida 124 vezes)

0 Membros e 1 Visitante estão a ver este tópico.

Offline WAREZBLOG

  • Moderador Global
  • ***
  • Mensagens: 10501
  • Karma: +0/-0
Build a Network Threat Hunting Project with Ansible & Python
« em: 19 de Janeiro de 2026, 22:13 »

Free Download Build a Network Threat Hunting Project with Ansible & Python
Published 1/2026
Created by Mihai Cătălin Teodosiu
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz, 2 Ch
Level: All | Genre: eLearning | Language: English | Duration: 55 Lectures ( 4h 15m ) | Size: 2.3 GB

Recruiters want results! Show them your network threat-hunting project with Zeek, Suricata, Python, MMdb, and Ansible.
What you'll learn
✓ Use Ansible to automate and orchestrate a PCAP analysis pipeline.
✓ Use Zeek and Suricata for deep PCAP analysis and log generation.
✓ Use Python code and MMdb to enrich the pipeline's functionality.
✓ Use Python to correlate all logs and alerts, and generate reports.
✓ Learn how to design and build an end-to-end analysis pipeline.
✓ Build a complete, 100% hands-on project to showcase to recruiters.
Requirements
● You should have a basic understanding of networking: TCP/IP, UDP, HTTP, DNS, etc.
● You should have a basic understanding of Python: syntax, data types, functions, libraries.
● All tools used in this course are 100% free - you won't be required to purchase anything.
● You need a decent PC and be able to assign 4GB RAM and 25GB disk space to the VM.
Description
Recruiters want results. Managers, too. They value builders and doers - not just theoreticians.
Show them your own hands-on threat-hunting lab for network traffic analysis, built around a fully automated pipeline using the following tools and technologies
• Zeek - deep PCAP analysis and context-rich security logs
• Suricata - detection based on pre-defined rules and signatures
• Ansible - automation and orchestration of the analysis pipeline
• Python - for building custom scripts and enriching functionality
• MMdb - for adding IP geolocation and ASN-related information
• VS Code - used for organizing all of our project files and folders
• Ubuntu - base operating system for the traffic analysis pipeline
• VirtualBox - used for virtualization and isolation purposes
During this course, you'll build a fully automated network traffic analysis pipeline that ingests PCAP files, runs in-depth analysis from multiple angles, generates actionable logs and alerts - as well as a Markdown report summary, and helps uncover unusual or malicious behavior in your network.
• We're going to build the project together from the ground up, step-by-step
• You will install, execute, code, and also troubleshoot everything alongside me
By the end, you'll have a threat-hunting lab that you can actually use in the real world for
• Becoming a better Network Engineer or Security Analyst
• Showcasing a strong project to companies and recruiters
• Monitoring and securing your own home network traffic
This project is a perfect fit if you're looking to showcase your skills as a
• Network Engineer or Network Security Analyst
• Network Automation Engineer or QA Engineer
• Network Detection and Response Engineer
• SOC Analyst, SOC Engineer
• Threat Hunting Engineer
Time is ticking - don't waste it! Start building.
Enroll now, and I'll see you in the first lecture.
Who this course is for
■ Network Administrators, Network Engineers, Network Analysts, Systems Engineers.
■ Network QA Engineers, Network Automation Engineers, Network Security Engineers.
■ Python enthusiasts who want to apply their knowledge to Network Automation.
■ Any other kind of IT, security, or networking geeks are welcome, as well.
Homepage
Código: [Seleccione]
https://www.udemy.com/course/threat-hunting/Published 1/2026
Created by Mihai Cătălin Teodosiu
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz, 2 Ch
Level: All | Genre: eLearning | Language: English | Duration: 55 Lectures ( 4h 15m ) | Size: 2.3 GB
Recruiters want results! Show them your network threat-hunting project with Zeek, Suricata, Python, MMdb, and Ansible.
What you'll learn
✓ Use Ansible to automate and orchestrate a PCAP analysis pipeline.
✓ Use Zeek and Suricata for deep PCAP analysis and log generation.
✓ Use Python code and MMdb to enrich the pipeline's functionality.
✓ Use Python to correlate all logs and alerts, and generate reports.
✓ Learn how to design and build an end-to-end analysis pipeline.
✓ Build a complete, 100% hands-on project to showcase to recruiters.
Requirements
● You should have a basic understanding of networking: TCP/IP, UDP, HTTP, DNS, etc.
● You should have a basic understanding of Python: syntax, data types, functions, libraries.
● All tools used in this course are 100% free - you won't be required to purchase anything.
● You need a decent PC and be able to assign 4GB RAM and 25GB disk space to the VM.
Description
Recruiters want results. Managers, too. They value builders and doers - not just theoreticians.
Show them your own hands-on threat-hunting lab for network traffic analysis, built around a fully automated pipeline using the following tools and technologies
• Zeek - deep PCAP analysis and context-rich security logs
• Suricata - detection based on pre-defined rules and signatures
• Ansible - automation and orchestration of the analysis pipeline
• Python - for building custom scripts and enriching functionality
• MMdb - for adding IP geolocation and ASN-related information
• VS Code - used for organizing all of our project files and folders
• Ubuntu - base operating system for the traffic analysis pipeline
• VirtualBox - used for virtualization and isolation purposes
During this course, you'll build a fully automated network traffic analysis pipeline that ingests PCAP files, runs in-depth analysis from multiple angles, generates actionable logs and alerts - as well as a Markdown report summary, and helps uncover unusual or malicious behavior in your network.
• We're going to build the project together from the ground up, step-by-step
• You will install, execute, code, and also troubleshoot everything alongside me
By the end, you'll have a threat-hunting lab that you can actually use in the real world for
• Becoming a better Network Engineer or Security Analyst
• Showcasing a strong project to companies and recruiters
• Monitoring and securing your own home network traffic
This project is a perfect fit if you're looking to showcase your skills as a
• Network Engineer or Network Security Analyst
• Network Automation Engineer or QA Engineer
• Network Detection and Response Engineer
• SOC Analyst, SOC Engineer
• Threat Hunting Engineer
Time is ticking - don't waste it! Start building.
Enroll now, and I'll see you in the first lecture.
Who this course is for
■ Network Administrators, Network Engineers, Network Analysts, Systems Engineers.
■ Network QA Engineers, Network Automation Engineers, Network Security Engineers.
■ Python enthusiasts who want to apply their knowledge to Network Automation.
■ Any other kind of IT, security, or networking geeks are welcome, as well.
Homepage
Código: [Seleccione]
https://www.udemy.com/course/threat-hunting/
Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
DDownload
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part1.rar
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part2.rar
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part3.rar
Rapidgator
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part1.rar.html
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part2.rar.html
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part3.rar.html
AlfaFile
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part1.rar
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part2.rar
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part3.rar

https://turbobit.net/ibal91brzo4z/xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part1.rar.html
https://turbobit.net/4tnkcf7ymjea/xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part2.rar.html
https://turbobit.net/lk1v1xuyqjmt/xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part3.rar.html
FreeDL
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part1.rar.html
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part2.rar.html
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part3.rar.html
No Password  - Links are Interchangeable