Section 2: Leveraging the Elastic Stack for Collection and Analysis
Here we'll focus on how to use the Elastic Stack to perform threat hunting. This will include an introduction to the components, how to build the stack for training and familiarity, and how to use the stack for threat hunting.
This part of the book comprises the following chapters:
- Chapter 3, Introduction to the Elastic Stack
- Chapter 4, Building Your Hunting Lab – Part 1
- Chapter 5, Building Your Hunting Lab – Part 2
- Chapter 6, Data Collection with Beats and Elastic Agent
- Chapter 7, Using Kibana to Explore and Visualize Data
- Chapter 8, The Elastic Security App