Using Splunk Enterprise Security (USES) Online

Total time
Location
Online
Starting date and place

Using Splunk Enterprise Security (USES) Online

Fast Lane Institute for Knowledge Transfer GmbH
Logo Fast Lane Institute for Knowledge Transfer GmbH
Provider rating: starstarstarstarstar_half 8.9 Fast Lane Institute for Knowledge Transfer GmbH has an average rating of 8.9 (out of 33 reviews)

Need more information? Get more details on the site of the provider.

Starting dates and places
computer Online: Online Training
2 Mar 2026 until 3 Mar 2026
computer Online: Online Training
30 Mar 2026 until 31 Mar 2026
computer Online: Online Training
25 May 2026 until 26 May 2026
computer Online: Online Training
27 Jul 2026 until 28 Jul 2026
computer Online: Online Training
14 Sep 2026 until 15 Sep 2026
computer Online: Online Training
26 Oct 2026 until 27 Oct 2026
computer Online: Online Training
7 Dec 2026 until 8 Dec 2026
Description

Kursinhalt

Module 1 - ES Fundamentals

  • Explain the function of a SIEM
  • Give an overview of Splunk Enterprise Security (ES)
  • Understand how ES uses data models
  • Describe detections and findings
  • Identify ES roles and permissions
  • Give an overview of ES navigation

Module 2 - Exploring the Analyst Queue

  • Explore the Analyst Queue
  • Filtering
  • Triage Findings and Finding Groups
  • Create ad hoc Findings
  • Suppress Findings from the Analyst Queue

Module 3 - Working with Investigations

  • Give an overview of an investigation
  • Demonstrate how to create an investigation
  • Use Response Plans
  • Add Splunk events to an investigation
  • Use Playbooks and Actions

Module 4 - Risk-based Alerting

  • Give an overview of risk and…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Kursinhalt

Module 1 - ES Fundamentals

  • Explain the function of a SIEM
  • Give an overview of Splunk Enterprise Security (ES)
  • Understand how ES uses data models
  • Describe detections and findings
  • Identify ES roles and permissions
  • Give an overview of ES navigation

Module 2 - Exploring the Analyst Queue

  • Explore the Analyst Queue
  • Filtering
  • Triage Findings and Finding Groups
  • Create ad hoc Findings
  • Suppress Findings from the Analyst Queue

Module 3 - Working with Investigations

  • Give an overview of an investigation
  • Demonstrate how to create an investigation
  • Use Response Plans
  • Add Splunk events to an investigation
  • Use Playbooks and Actions

Module 4 - Risk-based Alerting

  • Give an overview of risk and Risk-Based Alerting (RBA)
  • Explain risk scores and how to change an entity's risk score
  • Review the Risk Analysis dashboard
  • Describe annotations
  • View risk information in Analyst Queue findings

Module 5 - Assets & Identities

  • Give an overview of the ES Assets and Identities (A&I) framework
  • Show where asset or identity data is missing from ES findings or dashboards
  • View the A&I Management Interface
  • View the contents of an asset or identity lookup table
  • Identify A&I field matching criteria

Module 6 - Adaptive Responses

  • Describe Adaptive Responses
  • Identify the default ES Adaptive Responses
  • Discuss Adaptive Response invocation methods
  • Troubleshoot Adaptive Response issues

Module 7 - Security Domain Dashboards

  • Use ES to inspect events containing information relevant to active or past incident investigation
  • Identify ES Security Domains
  • Use the Security Domain dashboards
  • Launch Security Domain dashboards from the Analyst Queue and from field action menus in search results

Module 8 - Intelligence Dashboards

  • Use the Web Intelligence dashboards to analyze your network environment
  • Filter and highlight events
  • Understand and use User Intelligence dashboards
  • Use Investigators to analyze events related to an asset or identity
  • Use Access Anomalies to detect suspicious access patterns

Module 9 - Threat Intelligence

  • Give an overview of the Threat Intelligence framework
  • Identify where Threat Intelligence is configured
  • Observe Threat Findings
  • View downloaded Threat Indicators
  • Troubleshooting Threat Intelligence

Module 10 - Protocol Intelligence

  • Explain how network data is input into Splunk events
  • Describe stream events
  • Give an overview of the Protocol Intelligence dashboards and how they can be used to analyze network data

Voraussetzungen

To be successful, students should have a working understanding of the topics covered in the following Splunk courses:

  • Intro to Splunk (eLearning)
  • Using Fields (SUF)
  • Visualizations
  • Search Under the Hood
  • Intro to Knowledge Objects
  • Introduction to Dashboards (ITD)

Zielgruppe

SOC Analysts.

There are no reviews yet.
    Share your review
    Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.

    There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.