Splunk for SOC Analyst: Zero to Security Operations Hero
Master Splunk for SOC analysis: from beginner to incident response expert in this comprehensive course.
...
Share
Introduction to Splunk and the SOC
Unit 1: Understanding the SOC
What is a SOC?
SOC Functions
SOC Infrastructure
SOC Workflow
SOC Roles
Unit 2: Splunk and the SOC
Splunk's Purpose
Splunk's Benefits
Data Sources for Splunk
Splunk vs. SIEM
Splunk's Scalability
Unit 3: Security Threats and Incidents
Malware Threats
Phishing Attacks
Insider Threats
DDoS Attacks
Ransomware
Getting Started with Splunk: Installation and Configuration
Unit 1: Splunk Installation Basics
Splunk: What & Why?
System Requirements
Download Splunk
Installation Methods
First Install: GUI
Unit 2: Configuring Splunk
First Install: CLI
Initial Configuration
Understanding Indexes
Data Inputs: Overview
Configuring File Inputs
Unit 3: Users, Roles, and Permissions
Network Port Inputs
Forwarder Configuration
Users and Authentication
Roles and Permissions
Best Practices
Navigating the Splunk Interface
Unit 1: Splunk Web Interface Fundamentals
Welcome to Splunk Web!
The App Bar
Home Page Overview
Using the Navigation Bar
Understanding Splunk Roles
Unit 2: Searching and Exploring Data
Meet the Search Bar
Your First Search!
Time Range Picker
Field Discovery
Search History
Unit 3: Apps, Dashboards, and Customization
Splunk Apps: An Overview
Navigating Apps
Dashboard Basics
Interface Tweaks
CLI: A Quick Look
Introduction to Splunk Search Processing Language (SPL)
Unit 1: SPL Fundamentals
What is SPL?
SPL Syntax Essentials
Your First SPL Search
Time Modifiers
Wildcard Searches
Unit 2: Filtering and Refining Results
The 'where' Command
Boolean Operators
The 'search' Command
Field Existence Checks
Refining with Quotes
Unit 3: Extracting and Sorting Data
The 'extract' Command
The 'rex' Command
The 'fields' Command
The 'sort' Command
Chaining Commands with |
Filtering and Transforming Data with SPL
Unit 1: Filtering with the 'where' Command
Intro to 'where'
Simple 'where' Filters
Wildcards with 'where'
NOT with 'where'
Best Practices for 'where'
Unit 2: Comparison and Boolean Operators
Comparison Operators
Numerical Comparisons
String Comparisons
Boolean Operators: AND
Boolean Operators: OR
Unit 3: Transforming Data with 'eval'
Intro to 'eval'
Creating New Fields
Basic Calculations
String Manipulation
Conditional Logic with Eval
Unit 4: Advanced Transformations
Date/Time Conversion
The Power of 'case'
Putting It All Together
Data Visualization in Splunk
Unit 1: Visualizing Data: The Basics
Why Visualize Data?
Chart Types in Splunk
Creating Your First Chart
Table Visualizations
Graph Visualizations
Unit 2: Advanced Visualization Techniques
Time-Based Visuals
Customizing Charts
Formatting Like a Pro
Statistical Visualizations
Geospatial Visualizations
Unit 3: Dashboards and Best Practices
Dashboard Basics
Dashboard Drill-Downs
Dashboard Best Practices
Real-Time Dashboards
Visualizing for the SOC
Creating and Managing Splunk Alerts
Unit 1: Understanding Splunk Alerts
Alerts: The Big Picture
Alerting Key Concepts
Alerting Best Practices
Unit 2: Creating Basic Splunk Alerts
Alerts from Searches
Alerting on Thresholds
Alerting on Event Count
Unit 3: Configuring Alert Actions
Email Notifications
Scripted Actions
Webhook Actions
Unit 4: Managing and Prioritizing Alerts
Alert Suppression
Alert Prioritization
Alert Ownership
Unit 5: Scheduling and Maintaining Alerts
Scheduled Alerts
Alert Maintenance
Alert Documentation
Investigating Security Incidents with Splunk
Unit 1: Incident Investigation Fundamentals
Incident Investigation 101
Data Sources for Insight
Initial Triage
Splunk Investigation Workflow
The Art of Asking Questions
Unit 2: Correlation and Timeline Analysis
Event Correlation Basics
Time to Timeline
Correlation Search Deep Dive
Visualizing the Attack
Case Study: Timeline Analysis
Unit 3: Identifying Affected Systems and Users
Asset Identification
User Identification
Lateral Movement
Data Exfiltration
Containment Strategies
Reporting and Dashboards for Security Posture
Unit 1: Introduction to Splunk Reporting
Reporting Overview
Report Creation Basics
Report Permissions
Report Scheduling
Report Delivery
Unit 2: Advanced Reporting Techniques
Report Formatting
Using Report Templates
Report Acceleration
Drilldown Reports
Report Cloning
Unit 3: Dashboard Creation and Customization
Dashboard Basics
Creating a Dashboard
Dashboard Panels
Dashboard Visualization
Dashboard Drilldowns
Threat Intelligence Integration
Unit 1: Understanding Threat Intelligence
What is Threat Intel?
Benefits for the SOC
Threat Intel Feeds
Unit 2: Integrating Threat Intelligence into Splunk
Setting up the TAXII Client
Using Lookup Tables
Using the REST API
Unit 3: Leveraging Threat Intelligence in Splunk
Enriching Searches
Creating Threat Intel Alerts
Visualizing Threat Data
Unit 4: Responding to Threats with Intelligence
Incident Investigation
Automated Response
Unit 5: Managing and Maintaining Threat Intelligence
Feed Management
Validating Threat Intel
Sharing Intel
Introduction to Splunk Enterprise Security (ES)
Unit 1: Understanding Splunk ES
What is Splunk ES?
ES Benefits
ES Core Components
ES Data Sources
Unit 2: Navigating the ES Interface
ES Interface Overview
Dashboards Deep Dive
Event Sequencing
Investigating Incidents
Unit 3: Correlation Searches and Configuration
Correlation Searches
Creating Searches
Configuring ES
Asset & Identity Mgmt
Risk Framework
Unit 4: Views and Customization
ES Views
Customizing ES
Advanced Security Analytics with Splunk ES
Unit 1: Understanding Advanced Analytics in Splunk ES
Intro to Advanced ES
Anomaly Detection Basics
Behavioral Analysis Intro
Use Cases for Analytics
Unit 2: Incident Review Workflow and Correlation Searches
ES Incident Review
Investigating Incidents
Correlation Searches: Intro
Creating a Search
Unit 3: Risk Framework and Threat Intelligence
Risk Framework: Intro
Using Risk Scores
Threat Feeds in ES
Responding to Threats
Unit 4: Integration and Customization
Integrating with Tools
Customizing ES
ES Best Practices
Incident Management with Splunk ES
Unit 1: Introduction to Incident Management in Splunk ES
Incident Mgmt Overview
Navigating Incident Review
Incident Workflow
Unit 2: Incident Assignment and Tracking
Assigning Incidents
Tracking Incident Progress
Escalation Paths
Unit 3: Collaboration and Investigation
Team Collaboration
Deep Dive Investigation
External Resources
Unit 4: Documentation and Reporting
Documenting Actions
Incident Outcomes
Reporting Overview
Custom Reports
Unit 5: Advanced Incident Management
Automation
Risk Framework
Integration
Compliance Reporting with Splunk ES
Unit 1: Understanding Compliance Reporting in Splunk ES
Compliance Reporting 101
Navigating Compliance
Data Sources for Compliance
Roles & Permissions
Unit 2: Generating and Customizing Compliance Reports
Generating PCI DSS Reports
HIPAA Reporting
Custom Reports: The Basics
Custom Reports: Advanced
Unit 3: Scheduling and Automating Compliance Reporting
Scheduling Reports
Alerting on Compliance
Dashboards for Compliance
Unit 4: Compliance Monitoring and Auditing
Monitoring Compliance
Audit Trails
Preparing for Audits
Best Practices