<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="35273" language="fr" source="https://portal.flane.ch/swisscom/fr/xml-course/splunk-seith" lastchanged="2026-03-12T11:17:52+01:00" parent="https://portal.flane.ch/swisscom/fr/xml-courses"><title>SOC Essentials: Investigating and Threat Hunting</title><productcode>SEITH</productcode><vendorcode>SP</vendorcode><vendorname>Splunk</vendorname><fullproductcode>SP-SEITH</fullproductcode><version>6.4.1</version><objective>&lt;p&gt;At the end of this course you should be able to:
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Describe SIEM best practices and basic operation concepts of Splunk Enterprise Security, including the interaction between CIM, Data Models, and acceleration, and common CIM fields that may be used in investigations.&lt;/li&gt;&lt;li&gt;Carry out a typical triage and investigation process using Splunk Enterprise Security.&lt;/li&gt;&lt;li&gt;Describe the purpose of the Asset and Identity, and Threat Intelligence frameworks in ES.&lt;/li&gt;&lt;li&gt;Define Splunk ES elements like Notable Event, Risk Notable, Adaptive Response Action, Risk Object, and Contributing Events.&lt;/li&gt;&lt;li&gt;Identify common built-in dashboards in Enterprise Security and the basic information they contain.&lt;/li&gt;&lt;li&gt;Explain the use of SOAR playbooks and list the basic ways they can be triggered from Enterprise Security.&lt;/li&gt;&lt;li&gt;Explain the essentials of Risk-based Alerting and the Risk framework.&lt;/li&gt;&lt;li&gt;List the common high-level steps of threat hunting using the PEAK framework and practice some common steps of hypothesis hunting with Splunk.&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;p&gt;To be successful, students should have a working understanding of the topics covered in the Intro to Splunk course as well as a basic understanding of common cyber technologies and concepts including:
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Networking concepts and common security tools&lt;/li&gt;&lt;li&gt;Common Operating Systems like Windows and Linux&lt;/li&gt;&lt;/ul&gt;</essentials><outline>&lt;h4&gt;Introduction&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;The CyberSecurity Defense Analyst&lt;/li&gt;&lt;li&gt;CIM, Data Models and Correlation Refresh&lt;/li&gt;&lt;li&gt;Lab 1: Introducing the environment&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Splunk Enterprise Security (ES) for Analysts&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;What is SIEM again?&lt;/li&gt;&lt;li&gt;Asset &amp;amp; Identity Framework&lt;/li&gt;&lt;li&gt;Threat Intelligence Framework&lt;/li&gt;&lt;li&gt;Notable Event Framework Adaptive Response Framework&lt;/li&gt;&lt;li&gt;Incident Investigation Management in Splunk ES&lt;/li&gt;&lt;li&gt;Lab 2: Pick up an Investigation&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Risk Analysis Framework&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;Overview&lt;/li&gt;&lt;li&gt;Lab 3: Continue your investigation with RBA&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Working with Splunk SOAR&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;Introducing Splunk SOAR&lt;/li&gt;&lt;li&gt;Lab 4: Splunk SOAR practice&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Threat Hunting with PEAK&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;PEAK Overview&lt;/li&gt;&lt;li&gt;Lab 5: Threat Hunting Hands-on&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Challenge Lab&lt;/h4&gt;&lt;ul&gt;
&lt;li&gt;Lab 6: Run your own investigation&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>At the end of this course you should be able to:



- Describe SIEM best practices and basic operation concepts of Splunk Enterprise Security, including the interaction between CIM, Data Models, and acceleration, and common CIM fields that may be used in investigations.
- Carry out a typical triage and investigation process using Splunk Enterprise Security.
- Describe the purpose of the Asset and Identity, and Threat Intelligence frameworks in ES.
- Define Splunk ES elements like Notable Event, Risk Notable, Adaptive Response Action, Risk Object, and Contributing Events.
- Identify common built-in dashboards in Enterprise Security and the basic information they contain.
- Explain the use of SOAR playbooks and list the basic ways they can be triggered from Enterprise Security.
- Explain the essentials of Risk-based Alerting and the Risk framework.
- List the common high-level steps of threat hunting using the PEAK framework and practice some common steps of hypothesis hunting with Splunk.</objective_plain><essentials_plain>To be successful, students should have a working understanding of the topics covered in the Intro to Splunk course as well as a basic understanding of common cyber technologies and concepts including:



- Networking concepts and common security tools
- Common Operating Systems like Windows and Linux</essentials_plain><outline_plain>Introduction


- The CyberSecurity Defense Analyst
- CIM, Data Models and Correlation Refresh
- Lab 1: Introducing the environment
Splunk Enterprise Security (ES) for Analysts


- What is SIEM again?
- Asset &amp; Identity Framework
- Threat Intelligence Framework
- Notable Event Framework Adaptive Response Framework
- Incident Investigation Management in Splunk ES
- Lab 2: Pick up an Investigation
Risk Analysis Framework


- Overview
- Lab 3: Continue your investigation with RBA
Working with Splunk SOAR


- Introducing Splunk SOAR
- Lab 4: Splunk SOAR practice
Threat Hunting with PEAK


- PEAK Overview
- Lab 5: Threat Hunting Hands-on
Challenge Lab


- Lab 6: Run your own investigation</outline_plain><duration unit="d" days="0">9 heures</duration><pricelist><price country="US" currency="USD">1000.00</price><price country="SI" currency="EUR">1000.00</price><price country="GB" currency="GBP">835.00</price><price country="PL" currency="USD">1000.00</price><price country="DE" currency="EUR">1000.00</price><price country="CA" currency="CAD">1380.00</price><price country="CH" currency="CHF">1100.00</price><price country="FR" currency="EUR">1000.00</price></pricelist><miles><milesvalue country="CA" vendorcurrency="SPC" vendorcurrencyname="Splunk Training Units">100.00</milesvalue><milesvalue country="US" vendorcurrency="SPC" vendorcurrencyname="Splunk Training Units">100.00</milesvalue><milesvalue country="GB" vendorcurrency="SPC" vendorcurrencyname="Splunk Training Units">100.00</milesvalue><milesvalue country="PL" vendorcurrency="SPC" vendorcurrencyname="Splunk Training Units">100.00</milesvalue><milesvalue country="DE" vendorcurrency="SPC" vendorcurrencyname="Splunk Training Units">100.00</milesvalue><milesvalue country="CH" vendorcurrency="SPC" vendorcurrencyname="Splunk Training Units">100.00</milesvalue><milesvalue country="AT" vendorcurrency="SPC" vendorcurrencyname="Splunk Training Units">100.00</milesvalue></miles></course>