By Ben Reardon
The threat actors who created SUNBURST went to extraordinary lengths to hide Command-and-Control (C2) traffic by mimicking the nature of communication patterns used by legitimate software within the SolarWinds package. The contents of the C2 communications are ... Read more »
Training overview
Learn about our Zeek training materials and courses.
Free video training!
Download training overview
One day Corelight / Zeek training session
For incident responders, threat hunters and pen testers who are new to Zeek—learn everything to start using this powerful tool.
Online
Download class summary
Three day Corelight / Zeek training session
Our most in-depth offering gives your team three days of activity-based training from world-class Zeek experts