Visão Geral
Este curso apresenta o uso do Elastic Stack (Elasticsearch, Logstash, Kibana, Beats e Elastic Agent) como uma solução completa de SIEM (Security Information and Event Management). Os participantes aprenderão a coletar, normalizar, centralizar, analisar e visualizar eventos de segurança, além de configurar detecções, alertas, dashboards e automações de resposta dentro do Elastic Security.
Conteúdo Programatico
Module 1 — Introduction to Elastic Stack and SIEM
- Overview of SIEM concepts
- Elastic Stack architecture
- Elastic Security overview
- Main components (Elasticsearch, Kibana, Logstash, Beats, Elastic Agent)
- How Elastic works as a SIEM
Module 2 — Installation and Configuration
- Installing Elasticsearch cluster
- Configuring Kibana
- Installing Logstash and Beats
- Deployment of Elastic Agent and Fleet Server
- Basic cluster administration
Module 3 — Data Collection and Ingestion Pipelines
- Log ingestion strategies
- Ingestion via Filebeat, Metricbeat, Packetbeat, Winlogbeat
- Centralized management with Fleet
- Logstash pipelines and filters
- Parsing, enrichment, and normalization
Module 4 — Data Normalization and ECS (Elastic Common Schema)
- What is ECS
- ECS fields and structure
- Mapping third-party logs to ECS
- Benefits for correlation
Module 5 — Building Dashboards and Visualizations in Kibana
- Discover and data exploration
- Kibana Lens
- Dashboards creation
- Filters, tags, and saved queries
- Visualizing security-related metrics
Module 6 — Threat Detection and Correlation Rules
- Elastic Security detection engine
- Prebuilt detection rules
- Custom rule creation
- Threshold rules
- EQL (Event Query Language) correlation
- Machine Learning-based detections
Module 7 — Alerting and Response Automation
- Configuring alerting connectors
- Email, Slack, Webhook, and Elasticsearch actions
- Case management
- Automated remediation workflows
- SOAR-like features in Elastic Security
Module 8 — Threat Hunting with Elastic
- Threat hunting methodology
- Querying with KQL and Lucene queries
- Indicator of compromise (IOC) hunting
- Network and endpoint analysis
- Practical hunting exercises
Module 9 — Endpoint Security and EDR
- Elastic Endpoint Security
- Malware detection
- Behavioral analytics
- Preventing ransomware and exploits
- EDR capabilities
- Live response
Module 10 — Integration with Other Security Tools
- SIEM integrations:
- Firewalls (Palo Alto, Fortigate, Cisco ASA)
- Windows and Linux endpoints
- AWS CloudTrail
- Sysmon
- Active Directory logs
- External threat intelligence feeds
Module 11 — SOC Operations with Elastic
- Incident triage
- Investigation workflows
- Case management and reporting
- Best practices for SOC teams
- Retention, scaling, and performance tuning
Module 12 — Final Project
- Designing and implementing a fully functional Elastic SIEM
- Configuring logs, detections, dashboards, and alerts
- Presenting a security incident investigation