In this course, you will be provided with a conceptual overview of logs and their role in Intrusion Detection Systems (IDSs) and Security Information and Event Management tools (SIEMs). The course will discuss the general concept of an IDS and how it works to detect attacks before highlighting specific IDS and SIEM products, such as Suricata, Splunk and Google SecOps (Chronicle), respectively. You will then develop an understanding of how to access and navigate within Suricata and how basic rules are set up to provide alerts, events, and logs for malicious network traffic. This course will conclude with an introduction to Splunk and Google SecOps (Chronicle) and will showcase some of their features, including common commands.



Network Traffic and Logs Using IDS and SIEM Tools
This course is part of Google Network Security Specialization

Instructor: Google Career Certificates
Top Instructor
Access provided by SR University
Recommended experience
What you'll learn
Understand basic syntax, components of signatures and logs in Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) tools
Perform queries in Security Information and Event Management (SIEM) tools to investigate an event
Determine how to read and analyze logs during incident investigation
Describe how common intrusion detection system (IDS) tools provide security value
Skills you'll gain
Details to know

Add to your LinkedIn profile
5 assignments
September 2025
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

There are 4 modules in this course
In this module, you will be provided with a conceptual overview of logs and their role in Intrusion Detection Systems (IDSs) and Security Information and Event Management tools (SIEMs). The module will highlight the importance of logs, best practices for log collection and management, the variations of logs, and provide an overview of log file formats.
What's included
3 videos2 readings2 assignments1 plugin
This module will discuss the general concept of an IDS and how it works to detect attacks before highlighting specific IDS and SIEM products, such as Suricata, Splunk and Google SecOps (Chronicle), respectively. Learners will then develop an understanding of how to access and navigate within Suricata and how basic rules are set up to provide alerts, events, and logs for malicious network traffic.
What's included
4 videos5 readings1 assignment2 app items
In this module, you will get an introduction to Splunk and Google SecOps (Chronicle). The module will describe log sources and log ingestion and provide information on search methods with SIEM tools.
What's included
3 videos2 readings1 assignment
Review everything you’ve learned and take the final assessment.
What's included
1 reading1 assignment
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor

Offered by
Why people choose Coursera for their career




Explore more from Computer Science
Coursera Project Network