[MULTI] Build A Network Threat Hunting Project With Ansible & Python

jinkping5

U P L O A D E R
02218fbdb8444f48fddda8554050b3c3.jpg

Build A Network Threat Hunting Project With Ansible & Python
Published 1/2026
Created by Mihai Cătălin Teodosiu
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz, 2 Ch
Level: All | Genre: eLearning | Language: English | Duration: 55 Lectures ( 4h 15m ) | Size: 2.3 GB​

Recruiters want results! Show them your network threat-hunting project with Zeek, Suricata, Python, MMdb, and Ansible.
What you'll learn
✓ Use Ansible to automate and orchestrate a PCAP analysis pipeline.
✓ Use Zeek and Suricata for deep PCAP analysis and log generation.
✓ Use Python code and MMdb to enrich the pipeline's functionality.
✓ Use Python to correlate all logs and alerts, and generate reports.
✓ Learn how to design and build an end-to-end analysis pipeline.
✓ Build a complete, 100% hands-on project to showcase to recruiters.
Requirements
● You should have a basic understanding of networking: TCP/IP, UDP, HTTP, DNS, etc.
● You should have a basic understanding of Python: syntax, data types, functions, libraries.
● All tools used in this course are 100% free - you won't be required to purchase anything.
● You need a decent PC and be able to assign 4GB disk space to the VM.
Description
Recruiters want results. Managers, too. They value builders and doers - not just theoreticians.
Show them your own hands-on threat-hunting lab for network traffic analysis, built around a fully automated pipeline using the following tools and technologies
• Zeek - deep PCAP analysis and context-rich security logs
• Suricata - detection based on pre-defined rules and signatures
• Ansible - automation and orchestration of the analysis pipeline
• Python - for building custom scripts and enriching functionality
• MMdb - for adding IP geolocation and ASN-related information
• VS Code - used for organizing all of our project files and folders
• Ubuntu - base operating system for the traffic analysis pipeline
• VirtualBox - used for virtualization and isolation purposes
During this course, you'll build a fully automated network traffic analysis pipeline that ingests PCAP files, runs in-depth analysis from multiple angles, generates actionable logs and alerts - as well as a Markdown report summary, and helps uncover unusual or malicious behavior in your network.
• We're going to build the project together from the ground up, step-by-step
• You will install, execute, code, and also troubleshoot everything alongside me
By the end, you'll have a threat-hunting lab that you can actually use in the real world for
• Becoming a better Network Engineer or Security Analyst
• Showcasing a strong project to companies and recruiters
• Monitoring and securing your own home network traffic
This project is a perfect fit if you're looking to showcase your skills as a
• Network Engineer or Network Security Analyst
• Network Automation Engineer or QA Engineer
• Network Detection and Response Engineer
• SOC Analyst, SOC Engineer
• Threat Hunting Engineer
Time is ticking - don't waste it! Start building.
Enroll now, and I'll see you in the first lecture.
Who this course is for
■ Network Administrators, Network Engineers, Network Analysts, Systems Engineers.
■ Network QA Engineers, Network Automation Engineers, Network Security Engineers.
■ Python enthusiasts who want to apply their knowledge to Network Automation.
■ Any other kind of IT, security, or networking geeks are welcome, as well.


Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to | Data-Load.in

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten