Introduction to Splunk and the SOC
Splunk Interface Overview
Data Ingestion and Indexing
Introduction to Search Processing Language (SPL)
Basic SPL Commands: Keywords and Operators
Filtering and Transforming Data with SPL
Analyzing Data with Statistics and Charts
Identifying Malware Infections
Detecting Phishing Attempts
Investigating Unauthorized Access
Building Interactive Dashboards
Data Correlation Techniques
Identifying Complex Security Incidents
Introduction to Splunk Alerts
Creating and Managing Alerts
Responding to Security Threats with Alerts
Introduction to Splunk Enterprise Security (ES)
Using Splunk ES for Security Monitoring
Incident Response with Splunk ES
Best Practices and Next Steps