Administering Splunk Enterprise Security (ASES)

Total time
Location
At location
Starting date and place

Administering Splunk Enterprise Security (ASES)

Fast Lane Institute for Knowledge Transfer GmbH
Logo Fast Lane Institute for Knowledge Transfer GmbH
Provider rating: starstarstarstarstar_half 8.9 Fast Lane Institute for Knowledge Transfer GmbH has an average rating of 8.9 (out of 33 reviews)

Need more information? Get more details on the site of the provider.

Starting dates and places
placeHamburg
4 Mar 2026 until 5 Mar 2026
placeHamburg
1 Apr 2026 until 2 Apr 2026
placeMünchen
27 May 2026 until 28 May 2026
placeFrankfurt
29 Jul 2026 until 30 Jul 2026
placeStuttgart
16 Sep 2026 until 17 Sep 2026
placeBerlin
28 Oct 2026 until 29 Oct 2026
placeMünchen
9 Dec 2026 until 10 Dec 2026
Description

Kursinhalt

Module 1 - Introduction to Enterprise Security

  • Explain the function of a SIEM
  • Give an overview of Splunk’s Enterprise Security (ES)
  • Describe detections and findings
  • Configure ES roles and permissions
  • Give an overview of ES navigation

Module 2 - Customizing the Analyst Queue and findings

  • Give an overview of the Analyst Queue
  • Create and use Analyst Queue Views
  • Customize the Analyst Queue
  • Modify Urgency
  • Create new Status values
  • Add fields to Finding attributes
  • Create ad hoc Findings
  • Suppress Findings

Module 3 - Working with Investigations

  • Give an overview of an investigation
  • Use and create Response Plans
  • Add Splunk events to an investigation
  • Use Playbooks and Actions

Module 4 …

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Kursinhalt

Module 1 - Introduction to Enterprise Security

  • Explain the function of a SIEM
  • Give an overview of Splunk’s Enterprise Security (ES)
  • Describe detections and findings
  • Configure ES roles and permissions
  • Give an overview of ES navigation

Module 2 - Customizing the Analyst Queue and findings

  • Give an overview of the Analyst Queue
  • Create and use Analyst Queue Views
  • Customize the Analyst Queue
  • Modify Urgency
  • Create new Status values
  • Add fields to Finding attributes
  • Create ad hoc Findings
  • Suppress Findings

Module 3 - Working with Investigations

  • Give an overview of an investigation
  • Use and create Response Plans
  • Add Splunk events to an investigation
  • Use Playbooks and Actions

Module 4 - Asset & Identity Management

  • Review the Asset and Identity Management interface
  • Describe Asset and Identity KV Store collections
  • Configure and add asset and identity lookups to the interface
  • Configure settings and fields for asset and identity lookups
  • Explain the asset and identity merge process
  • Describe the process for retrieving LDAP data for an asset or identity lookup

Module 5 - Data Normalization

  • Understand how ES uses accelerated data models
  • Verify data is correctly configured for use in ES
  • Validate normalization configurations
  • Install additional add-ons
  • Ingest custom data in ES
  • Create an add-on for a custom sourcetype
  • Describe add-on troubleshooting

Module 6 - Detection Engineering

  • Give an overview of how to create Event-based detections
  • Review the Detection Editor
  • Give an overview of how to create Finding-based detections

Module 7 - Risk-Based Alerting

  • Give an overview of Risk-Based Alerting (RBA)
  • Explain risk scores and how they can be changed by detections or manually
  • Review the Risk analysis dashboard
  • Understand Finding-based detections
  • Describe annotations
  • View risk information in Analyst Queue findings

Module 8 - Managing Threat Intelligence

  • Understand and configure threat intelligence
  • Use the Threat Intelligence interface to configure threat lists
  • Configure new threat lists

Module 9 - Post-Deployment Configuration

  • Give an overview of general ES install requirements
  • Explain the different add-ons and where they are installed
  • Provide ES pre-installation requirements
  • Describe the Splunk_TA_ForIndexers app and where it is installed
  • Set general configuration options
  • Configure local and cloud domain information
  • Work with the Incident Review KV Store
  • Customize navigation
  • Configure Key Indicator searches

Voraussetzungen

To be successful, students must have completed the following Splunk Education course:

  • Using Splunk Enterprise Security (USES)

Students should also be familiar with the topics covered in the following courses:

  • Intro to Splunk
  • Using Fields (SUF)
  • Visualizations
  • Search Under the Hood
  • Intro to Knowledge Objects
  • Creating Knowledge Objects (CKO)
  • Creating Field Extractions (CFE)
  • Enriching Data with Lookups (EDL)
  • Data Models (SDM)
  • Introduction to Dashboards (ITD)
  • Splunk Enterprise System Administration (SESA) AND Splunk Enterprise Data Administration (SEDA) OR Splunk Cloud Administration (SCA)

Zielgruppe

  • SOC Analyst
  • SOC Engineer
There are no reviews yet.
    Share your review
    Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.

    There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.