Learn Humio
Advanced log management course: strategies, techniques, and tactics
- View session #1 – Planning and Design on-demand
- View session #2 – Centralized Log Collection and Management on-demand
- View session #3 – Integrating security throughout your infrastructure on-demand
- View Session #4 – Threat management and forensics using streaming log data
- View Session #5 – Dive deep into complete system observability through log data
- View Session #6 – Cost vs scale – the industry has it all wrong
- https://www.humio.com/threat-management-and-forensics-using-streaming-log-data
- https://www.humio.com/advanced-log-management-course-strategies-techniques-and-tactics?mkt_tok=NzU2LUxNWS0xMDYAAAF8dNAKMZQ4JQLiFGKo591uWC3cPoZ1gjKnWdOuMjZXPf-glur66KFkB0jdFUaq1sGyoNIqcVBDXKblWLALzye06Np8KEA5RORIdSPxbQwd
- Intro to Humio https://www.youtube.com/watch?v=rEma2v0VD1E&list=PLFuIO3ww7zFy5AOih2P1i7xXq66HdwT9v
- Detection Engineering
Slides
SOC Prime and Humio Integration
- SOC Prime and Humio Integration
- Humio DevSecOps Continuous Integration
- https://my.socprime.com/predictive-maintenance/
- https://socprime.com/
Real-time Threat Intelligence support
Learn Humio Playlist
Data Ingest Methods and Tokens
- Log Shippers
- Vector
- FluentD
- Elastic Beats
- Rsyslog
- Splunk HEC, etc
- Ingest listener
- TCP
- UDP
- Humio’s APIs
- Humio Ingest Tokens
- Per-repo, write-only token that allows you to send data to a specific repository.
- What Format does it support? https://avro.apache.org/docs/current/spec.html
Slack Community
Documentation
- Humio Library
https://mkto-sj320057.com/da0g016Hv00Y000M0h030L0
https://mkto-sj320057.com/f00ya0g00Z001M30LHYd000
Corelight + Humio
