* Cantinho Satkeys

Refresh History
  • FELISCUNHA: ghyt74  pessoal  4tj97u<z
    26 de Janeiro de 2026, 11:00
  • espioca: avast vpn
    26 de Janeiro de 2026, 06:27
  • j.s.: dgtgtr  todos  49E09B4F
    25 de Janeiro de 2026, 15:36
  • Radio TugaNet: Bom Dia Gente Boa
    25 de Janeiro de 2026, 10:18
  • FELISCUNHA: dgtgtr   49E09B4F  e bom fim de semana  4tj97u<z
    24 de Janeiro de 2026, 12:15
  • Cocanate: J]a esta no Forun
    24 de Janeiro de 2026, 01:54
  • Cocanate: Eu tenho
    24 de Janeiro de 2026, 01:46
  • Cocanate: boas minha gente
    24 de Janeiro de 2026, 01:26
  • joca34: BOM DIA AL TEM ESTE CD Star Music - A Minha prima Palmira
    23 de Janeiro de 2026, 15:23
  • joca34: OLA
    23 de Janeiro de 2026, 15:23
  • FELISCUNHA: Bom dia pessoal  4tj97u<z
    23 de Janeiro de 2026, 10:59
  • JPratas: try65hytr Pessoal  4tj97u<z 2dgh8i k7y8j0 classic
    23 de Janeiro de 2026, 05:16
  • j.s.: try65hytr a todos  49E09B4F
    20 de Janeiro de 2026, 18:15
  • FELISCUNHA: ghyt74  pessoal   49E09B4F
    20 de Janeiro de 2026, 11:07
  • j.s.: dgtgtr a todos  49E09B4F
    18 de Janeiro de 2026, 16:02
  • FELISCUNHA: ghyt74   49E09B4F  e bom fim de semana  4tj97u<z
    17 de Janeiro de 2026, 11:18
  • JPratas: try65hytr Pessoal  2dgh8i k7y8j0 yu7gh8
    16 de Janeiro de 2026, 04:50
  • j.s.: try65hytr a todos  49E09B4F 49E09B4F
    15 de Janeiro de 2026, 19:29
  • FELISCUNHA: ghyt74  pessoal   49E09B4F
    15 de Janeiro de 2026, 11:51
  • j.s.: try65hytr a todos
    13 de Janeiro de 2026, 19:09

Autor Tópico: Build a Network Threat Hunting Project with Ansible & Python  (Lida 33 vezes)

0 Membros e 1 Visitante estão a ver este tópico.

Online WAREZBLOG

  • Moderador Global
  • ***
  • Mensagens: 3499
  • Karma: +0/-0
Build a Network Threat Hunting Project with Ansible & Python
« em: 19 de Janeiro de 2026, 22:13 »

Free Download Build a Network Threat Hunting Project with Ansible & Python
Published 1/2026
Created by Mihai Cătălin Teodosiu
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz, 2 Ch
Level: All | Genre: eLearning | Language: English | Duration: 55 Lectures ( 4h 15m ) | Size: 2.3 GB

Recruiters want results! Show them your network threat-hunting project with Zeek, Suricata, Python, MMdb, and Ansible.
What you'll learn
✓ Use Ansible to automate and orchestrate a PCAP analysis pipeline.
✓ Use Zeek and Suricata for deep PCAP analysis and log generation.
✓ Use Python code and MMdb to enrich the pipeline's functionality.
✓ Use Python to correlate all logs and alerts, and generate reports.
✓ Learn how to design and build an end-to-end analysis pipeline.
✓ Build a complete, 100% hands-on project to showcase to recruiters.
Requirements
● You should have a basic understanding of networking: TCP/IP, UDP, HTTP, DNS, etc.
● You should have a basic understanding of Python: syntax, data types, functions, libraries.
● All tools used in this course are 100% free - you won't be required to purchase anything.
● You need a decent PC and be able to assign 4GB RAM and 25GB disk space to the VM.
Description
Recruiters want results. Managers, too. They value builders and doers - not just theoreticians.
Show them your own hands-on threat-hunting lab for network traffic analysis, built around a fully automated pipeline using the following tools and technologies
• Zeek - deep PCAP analysis and context-rich security logs
• Suricata - detection based on pre-defined rules and signatures
• Ansible - automation and orchestration of the analysis pipeline
• Python - for building custom scripts and enriching functionality
• MMdb - for adding IP geolocation and ASN-related information
• VS Code - used for organizing all of our project files and folders
• Ubuntu - base operating system for the traffic analysis pipeline
• VirtualBox - used for virtualization and isolation purposes
During this course, you'll build a fully automated network traffic analysis pipeline that ingests PCAP files, runs in-depth analysis from multiple angles, generates actionable logs and alerts - as well as a Markdown report summary, and helps uncover unusual or malicious behavior in your network.
• We're going to build the project together from the ground up, step-by-step
• You will install, execute, code, and also troubleshoot everything alongside me
By the end, you'll have a threat-hunting lab that you can actually use in the real world for
• Becoming a better Network Engineer or Security Analyst
• Showcasing a strong project to companies and recruiters
• Monitoring and securing your own home network traffic
This project is a perfect fit if you're looking to showcase your skills as a
• Network Engineer or Network Security Analyst
• Network Automation Engineer or QA Engineer
• Network Detection and Response Engineer
• SOC Analyst, SOC Engineer
• Threat Hunting Engineer
Time is ticking - don't waste it! Start building.
Enroll now, and I'll see you in the first lecture.
Who this course is for
■ Network Administrators, Network Engineers, Network Analysts, Systems Engineers.
■ Network QA Engineers, Network Automation Engineers, Network Security Engineers.
■ Python enthusiasts who want to apply their knowledge to Network Automation.
■ Any other kind of IT, security, or networking geeks are welcome, as well.
Homepage
Código: [Seleccione]
https://www.udemy.com/course/threat-hunting/Published 1/2026
Created by Mihai Cătălin Teodosiu
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz, 2 Ch
Level: All | Genre: eLearning | Language: English | Duration: 55 Lectures ( 4h 15m ) | Size: 2.3 GB
Recruiters want results! Show them your network threat-hunting project with Zeek, Suricata, Python, MMdb, and Ansible.
What you'll learn
✓ Use Ansible to automate and orchestrate a PCAP analysis pipeline.
✓ Use Zeek and Suricata for deep PCAP analysis and log generation.
✓ Use Python code and MMdb to enrich the pipeline's functionality.
✓ Use Python to correlate all logs and alerts, and generate reports.
✓ Learn how to design and build an end-to-end analysis pipeline.
✓ Build a complete, 100% hands-on project to showcase to recruiters.
Requirements
● You should have a basic understanding of networking: TCP/IP, UDP, HTTP, DNS, etc.
● You should have a basic understanding of Python: syntax, data types, functions, libraries.
● All tools used in this course are 100% free - you won't be required to purchase anything.
● You need a decent PC and be able to assign 4GB RAM and 25GB disk space to the VM.
Description
Recruiters want results. Managers, too. They value builders and doers - not just theoreticians.
Show them your own hands-on threat-hunting lab for network traffic analysis, built around a fully automated pipeline using the following tools and technologies
• Zeek - deep PCAP analysis and context-rich security logs
• Suricata - detection based on pre-defined rules and signatures
• Ansible - automation and orchestration of the analysis pipeline
• Python - for building custom scripts and enriching functionality
• MMdb - for adding IP geolocation and ASN-related information
• VS Code - used for organizing all of our project files and folders
• Ubuntu - base operating system for the traffic analysis pipeline
• VirtualBox - used for virtualization and isolation purposes
During this course, you'll build a fully automated network traffic analysis pipeline that ingests PCAP files, runs in-depth analysis from multiple angles, generates actionable logs and alerts - as well as a Markdown report summary, and helps uncover unusual or malicious behavior in your network.
• We're going to build the project together from the ground up, step-by-step
• You will install, execute, code, and also troubleshoot everything alongside me
By the end, you'll have a threat-hunting lab that you can actually use in the real world for
• Becoming a better Network Engineer or Security Analyst
• Showcasing a strong project to companies and recruiters
• Monitoring and securing your own home network traffic
This project is a perfect fit if you're looking to showcase your skills as a
• Network Engineer or Network Security Analyst
• Network Automation Engineer or QA Engineer
• Network Detection and Response Engineer
• SOC Analyst, SOC Engineer
• Threat Hunting Engineer
Time is ticking - don't waste it! Start building.
Enroll now, and I'll see you in the first lecture.
Who this course is for
■ Network Administrators, Network Engineers, Network Analysts, Systems Engineers.
■ Network QA Engineers, Network Automation Engineers, Network Security Engineers.
■ Python enthusiasts who want to apply their knowledge to Network Automation.
■ Any other kind of IT, security, or networking geeks are welcome, as well.
Homepage
Código: [Seleccione]
https://www.udemy.com/course/threat-hunting/
Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
DDownload
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part1.rar
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part2.rar
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part3.rar
Rapidgator
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part1.rar.html
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part2.rar.html
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part3.rar.html
AlfaFile
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part1.rar
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part2.rar
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part3.rar

https://turbobit.net/ibal91brzo4z/xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part1.rar.html
https://turbobit.net/4tnkcf7ymjea/xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part2.rar.html
https://turbobit.net/lk1v1xuyqjmt/xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part3.rar.html
FreeDL
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part1.rar.html
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part2.rar.html
xemvb.Build.a.Network.Threat.Hunting.Project.with.Ansible..Python.part3.rar.html
No Password  - Links are Interchangeable