A comprehensive course designed to equip aspiring SOC analysts with the fundamental Splunk skills needed for security monitoring, incident response, and threat detection.
...
Introduction to Splunk and the SOC
Unit 1: Understanding the SOC and SIEM
Unit 2: Splunk as a SIEM
Unit 3: SOC Analyst Workflow and Splunk
Navigating the Splunk Web Interface
Unit 1: Getting Started with the Splunk Web Interface
Unit 2: Key Interface Elements and Their Functions
Unit 3: Exploring Splunk Apps and Customization
Basic Splunk Search Queries
Unit 1: Introduction to Splunk Searching
Unit 2: Boolean Operators
Unit 3: Wildcards and Time Ranges
Introduction to Splunk's Search Processing Language (SPL)
Unit 1: SPL Fundamentals
Unit 2: Basic SPL Commands
Unit 3: Chaining Commands and Advanced Filtering
Data Analysis with SPL: Counting and Statistics
Unit 1: Counting Events with the 'count' Command
Unit 2: Calculating Statistics with the 'stats' Command
Unit 3: Grouping Data with the 'by' Clause
Visualizing Security Data in Splunk
Unit 1: Introduction to Splunk Visualizations
Unit 2: Exploring Different Chart Types
Unit 3: Tables and Advanced Customization
Ingesting Windows Event Logs into Splunk
Unit 1: Understanding Windows Event Logs
Unit 2: Configuring Splunk for Windows Event Logs
Unit 3: Troubleshooting and Best Practices
Processing Firewall Logs in Splunk
Unit 1: Understanding Firewall Logs
Unit 2: Ingesting Firewall Logs into Splunk
Unit 3: Field Extractions and Analysis
Working with Intrusion Detection System (IDS) Alerts
Unit 1: Understanding and Ingesting IDS Alerts
Unit 2: Normalizing and Correlating IDS Data
Unit 3: Prioritizing and Investigating IDS Alerts
Creating Basic Splunk Alerts
Unit 1: Understanding Splunk Alerts
Unit 2: Creating Basic Alerts
Unit 3: Configuring Alert Actions
Alerting on Suspicious User Behavior
Unit 1: Identifying Suspicious Login Activity
Unit 2: Monitoring Data Access and Usage
Unit 3: Creating and Tuning Splunk Alerts
Detecting Malware Infections with Splunk
Unit 1: Endpoint Data Analysis for Malware Detection
Unit 2: Creating Malware Detection Alerts
Unit 3: Threat Intelligence Integration and Incident Response