Using Splunk Enterprise Security (USES)

 

Course Overview

This 13.5-hour instructor-led course prepares SOC Analysts to use Splunk Enterprise Security (ES).Students identify and track incidents, analyze security risks, use predictive analytics, and discover threats.

Please note that this course may run over three days, with 4.5 hour sessions each day.

Who should attend

SOC Analysts.

Certifications

Prerequisites

To be successful, students should have a working understanding of the topics covered in the following Splunk courses:

Course Content

Module 1 - ES Fundamentals
  • Explain the function of a SIEM
  • Give an overview of Splunk Enterprise Security (ES)
  • Understand how ES uses data models
  • Describe detections and findings
  • Identify ES roles and permissions
  • Give an overview of ES navigation
Module 2 - Exploring the Analyst Queue
  • Explore the Analyst Queue
  • Filtering
  • Triage Findings and Finding Groups
  • Create ad hoc Findings
  • Suppress Findings from the Analyst Queue
Module 3 - Working with Investigations
  • Give an overview of an investigation
  • Demonstrate how to create an investigation
  • Use Response Plans
  • Add Splunk events to an investigation
  • Use Playbooks and Actions
Module 4 - Risk-based Alerting
  • Give an overview of risk and Risk-Based Alerting (RBA)
  • Explain risk scores and how to change an entity's risk score
  • Review the Risk Analysis dashboard
  • Describe annotations
  • View risk information in Analyst Queue findings
Module 5 - Assets & Identities
  • Give an overview of the ES Assets and Identities (A&I) framework
  • Show where asset or identity data is missing from ES findings or dashboards
  • View the A&I Management Interface
  • View the contents of an asset or identity lookup table
  • Identify A&I field matching criteria
Module 6 - Adaptive Responses
  • Describe Adaptive Responses
  • Identify the default ES Adaptive Responses
  • Discuss Adaptive Response invocation methods
  • Troubleshoot Adaptive Response issues
Module 7 - Security Domain Dashboards
  • Use ES to inspect events containing information relevant to active or past incident investigation
  • Identify ES Security Domains
  • Use the Security Domain dashboards
  • Launch Security Domain dashboards from the Analyst Queue and from field action menus in search results
Module 8 - Intelligence Dashboards
  • Use the Web Intelligence dashboards to analyze your network environment
  • Filter and highlight events
  • Understand and use User Intelligence dashboards
  • Use Investigators to analyze events related to an asset or identity
  • Use Access Anomalies to detect suspicious access patterns
Module 9 - Threat Intelligence
  • Give an overview of the Threat Intelligence framework
  • Identify where Threat Intelligence is configured
  • Observe Threat Findings
  • View downloaded Threat Indicators
  • Troubleshooting Threat Intelligence
Module 10 - Protocol Intelligence
  • Explain how network data is input into Splunk events
  • Describe stream events
  • Give an overview of the Protocol Intelligence dashboards and how they can be used to analyze network data

Preise & Trainingsmethoden

Online Training

Dauer
2 Tage

Preis
  • CHF 1'650.–
  • Splunk Training Units: 150 SPC
Klassenraum-Training

Dauer
2 Tage

Preis
  • Schweiz: CHF 1'650.–
  • Splunk Training Units: 150 SPC
 

Kurstermine

Instructor-led Online Training:   Dies ist ein Instructor-led Online Training, das über WebEx in einer VoIP Umgebung durchgeführt wird. Sollten Sie Fragen zu einem unserer Online-Kurse haben, können Sie uns jederzeit unter +41 44 832 50 80 oder per E-Mail an info@flane.ch kontaktieren.

Deutsch

Europäische Zeitzonen

Online Training Kurssprache: Deutsch
Online Training Kurssprache: Deutsch
Online Training Kurssprache: Deutsch
Online Training Kurssprache: Deutsch