Splunk Incident Investigation for SOC Analysts: Level 2

Elevate your SOC analyst skills with advanced Splunk techniques for incident investigation, threat hunting, and automated response.

Advanced Splunk Search Techniques for Incident Correlation

Unit 1: Mastering the Transaction Command

Unit 2: Statistical Analysis with Stats, Eventstats, and Streamstats

Unit 3: Data Enrichment with Lookups

Unit 4: Pattern Matching with Regex

Custom Dashboards and Alerting for Proactive Incident Detection

Unit 1: Dashboarding Fundamentals

Unit 2: Advanced Dashboarding Techniques

Unit 3: Alerting Fundamentals

Unit 4: Advanced Alerting and Response

Incident Investigation with Splunk Enterprise Security (ES)

Unit 1: Introduction to Splunk Enterprise Security (ES)

Unit 2: Investigating Notable Events in Splunk ES

Unit 3: Correlation Searches for Advanced Threat Detection

Unit 4: Risk Analysis and Threat Intelligence

Unit 5: Customizing Splunk ES for Incident Monitoring

Threat Hunting and Automation with Splunk

Unit 1: Threat Hunting Fundamentals

Unit 2: MITRE ATT&CK Framework Integration

Unit 3: Automation and Playbooks

Unit 4: Integration with External Tools

Anomaly Detection with Splunk Machine Learning Toolkit

Unit 1: Machine Learning Fundamentals for Security

Unit 2: Introduction to Splunk Machine Learning Toolkit

Unit 3: Training and Deploying ML Models

Unit 4: Interpreting and Validating ML Results