Learn Humio

Learn Humio

Advanced log management course: strategies, techniques, and tactics

  1. View session #1 – Planning and Design on-demandΒ 
  2. View session #2 – Centralized Log Collection and Management on-demand
  3. View session #3 – Integrating security throughout your infrastructure on-demand
  4. View Session #4 – Threat management and forensics using streaming log data
  5. View Session #5 – Dive deep into complete system observability through log data
  6. View Session #6 – Cost vs scale – the industry has it all wrong
  7. https://www.humio.com/threat-management-and-forensics-using-streaming-log-data
  8. https://www.humio.com/advanced-log-management-course-strategies-techniques-and-tactics?mkt_tok=NzU2LUxNWS0xMDYAAAF8dNAKMZQ4JQLiFGKo591uWC3cPoZ1gjKnWdOuMjZXPf-glur66KFkB0jdFUaq1sGyoNIqcVBDXKblWLALzye06Np8KEA5RORIdSPxbQwd
  9. Intro to Humio https://www.youtube.com/watch?v=rEma2v0VD1E&list=PLFuIO3ww7zFy5AOih2P1i7xXq66HdwT9v
  10. Detection Engineering
    1. https://www.crowdstrike.com/blog/what-is-detection-engineering-understanding-the-detection-engineering-life-cycle/

Slides

SOC Prime and Humio Integration

Real-time Threat Intelligence support

Data Ingest Methods and Tokens

  • Log Shippers
    • Vector
    • FluentD
    • Elastic Beats
    • Rsyslog
    • Splunk HEC, etc
  • Ingest listener
    • TCP
    • UDP
  • Humio’s APIs
  • Humio Ingest Tokens
    • Per-repo, write-only token that allows you to send data to a specific repository.
  • What Format does it support? https://avro.apache.org/docs/current/spec.html

Slack Community

Documentation

https://mkto-sj320057.com/da0g016Hv00Y000M0h030L0

https://mkto-sj320057.com/f00ya0g00Z001M30LHYd000