Splunk Incident Investigation for SOC Analysts: Level 2
Elevate your SOC analyst skills with advanced Splunk techniques for incident investigation, threat hunting, and automated response.
...
Share
Advanced Splunk Search Techniques for Incident Correlation
Unit 1: Mastering the Transaction Command
Transaction Command Intro
Basic Transaction Syntax
Maxspan and Maxpause
Keeporphans and Keptrans
Transaction Use Cases
Unit 2: Statistical Analysis with Stats, Eventstats, and Streamstats
Stats Command Intro
Stats by Clause
Eventstats Command Intro
Eventstats Use Cases
Streamstats Command Intro
Unit 3: Data Enrichment with Lookups
Lookup Command Intro
CSV Lookups
KV Store Lookups
Lookup Best Practices
Lookup Use Cases
Unit 4: Pattern Matching with Regex
Regex Intro
Regex Basics
Regex with the Extract Command
Regex with the Rex Command
Regex Use Cases
Custom Dashboards and Alerting for Proactive Incident Detection
Unit 1: Dashboarding Fundamentals
Dashboarding 101
Creating Your First Dash
Viz Types and Use Cases
Formatting is Key
Time Range Pickers
Unit 2: Advanced Dashboarding Techniques
Tokens and Variables
Dynamic Drilldowns
Input Controls
Chaining Searches
Customizing with CSS
Unit 3: Alerting Fundamentals
Alerting Concepts
Creating Your First Alert
Alert Severity Levels
Throttling Alerts
Alert Suppression
Unit 4: Advanced Alerting and Response
Custom Alert Actions
Webhook Integrations
Adaptive Response
Correlation Searches
Alert Optimization
Incident Investigation with Splunk Enterprise Security (ES)
Unit 1: Introduction to Splunk Enterprise Security (ES)
ES: What's the Big Deal?
ES Interface Overview
Configuring ES Data Inputs
ES User Roles & Permissions
ES Configuration Checklist
Unit 2: Investigating Notable Events in Splunk ES
Notable Events: A Deep Dive
Incident Review Dashboard
Event Details Demystified
Adding Context to Events
Escalating Notable Events
Unit 3: Correlation Searches for Advanced Threat Detection
Correlation Searches 101
Finding Correlation Searches
Anatomy of a Search
Enabling/Disabling Searches
Tuning Correlation Searches
Unit 4: Risk Analysis and Threat Intelligence
Risk Framework Explained
Risk Notable Events
Threat Intel Integration
Intel Notable Events
Customizing Intel Feeds
Unit 5: Customizing Splunk ES for Incident Monitoring
Dashboard Design Principles
Building Custom Dashboards
Custom Reports
Alerting Deep Dive
ES Customization Tips
Threat Hunting and Automation with Splunk
Unit 1: Threat Hunting Fundamentals
Intro to Threat Hunting
Hypothesis Generation
Hunting with Splunk
Hunting with Indicators
Hunting Without IOCs
Unit 2: MITRE ATT&CK Framework Integration
ATT&CK Framework Intro
Mapping Incidents to ATT&CK
ATT&CK-Based Hunting
ATT&CK for Reporting
ATT&CK Limitations
Unit 3: Automation and Playbooks
Intro to Automation
Splunk Playbooks
Adaptive Response
Orchestration
Testing Automation
Unit 4: Integration with External Tools
SIEM Integration
SOAR Integration
TIP Integration
EDR Integration
API Integrations
Anomaly Detection with Splunk Machine Learning Toolkit
Unit 1: Machine Learning Fundamentals for Security
ML for Security: Intro
Key ML Concepts
ML Workflow Overview
ML Use Cases in Security
Bias and Ethics in ML
Unit 2: Introduction to Splunk Machine Learning Toolkit
MLTK: What and Why?
Installing MLTK
MLTK Interface Overview
MLTK: Guided Tour
Data Requirements for ML
Unit 3: Training and Deploying ML Models
Choosing the Right Algo
Training Models in MLTK
Evaluating Model Perf
Deploying Models
Model Management
Unit 4: Interpreting and Validating ML Results
Understanding Results
Validating ML Findings
False Positives
Feedback Loops
Documenting ML Processes