Name Size
Parent Directory - Module 4 - Using Zeek for Defensive Cyber Operations/ - Module 3 - Using Zeek for Continuous Monitoring/ - Module 2 - Designing a Zeek Deployment for Enterprise Monitoring/ - Module 1 - Course Overview/ - Exercise Files/ -