<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="26214" language="fr" source="https://portal.flane.ch/swisscom/fr/xml-course/splunk-uses" lastchanged="2026-02-19T15:52:57+01:00" parent="https://portal.flane.ch/swisscom/fr/xml-courses"><title>Using Splunk Enterprise Security</title><productcode>USES</productcode><vendorcode>SP</vendorcode><vendorname>Splunk</vendorname><fullproductcode>SP-USES</fullproductcode><version>8</version><objective>&lt;ul&gt;
&lt;li&gt;ES concepts, features, and capabilities&lt;/li&gt;&lt;li&gt;Security monitoring and Incident investigation&lt;/li&gt;&lt;li&gt;Use risk-based alerting and risk analysis&lt;/li&gt;&lt;li&gt;Assets and identities overview&lt;/li&gt;&lt;li&gt;Creating investigations and using the Investigation Workbench&lt;/li&gt;&lt;li&gt;Detecting known types of threats&lt;/li&gt;&lt;li&gt;Monitoring for new types of threats&lt;/li&gt;&lt;li&gt;Using analytical tools and dashboards&lt;/li&gt;&lt;li&gt;Analyze user behavior for insider threats&lt;/li&gt;&lt;li&gt;Use threat intelligence tools&lt;/li&gt;&lt;li&gt;Use protocol intelligence&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;p&gt;To be successful, students should have a solid understanding of the following courses:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Intro to Splunk&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/fr/product/splunk-its&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Intro to Splunk &lt;span class=&quot;fl-prod-pcode&quot;&gt;(ITS)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/fr/course/splunk-suf&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Using Fields &lt;span class=&quot;fl-prod-pcode&quot;&gt;(SUF)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/fr/product/splunk-svz&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Visualizations &lt;span class=&quot;fl-prod-pcode&quot;&gt;(SVZ)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/fr/product/splunk-suh&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Search Under the Hood &lt;span class=&quot;fl-prod-pcode&quot;&gt;(SUH)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/fr/product/splunk-iko&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Intro to Knowledge Objects &lt;span class=&quot;fl-prod-pcode&quot;&gt;(IKO)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/fr/course/splunk-itd&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Introduction to Dashboards &lt;span class=&quot;fl-prod-pcode&quot;&gt;(ITD)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;</essentials><contents>&lt;p&gt;&lt;strong&gt;Module 1 - Getting Started with ES&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Describe the features and capabilities of Splunk Enterprise Security (ES)&lt;/li&gt;&lt;li&gt;Explain how ES helps security practitioners prevent, detect, and respond to threats&lt;/li&gt;&lt;li&gt;Describe correlation searches, data models and notable events&lt;/li&gt;&lt;li&gt;Describe user roles in ES&lt;/li&gt;&lt;li&gt;Log into Splunk Web and access Splunk for Enterprise Security&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 2 - Security Monitoring and Incident Investigation&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Use the Security Posture dashboard to monitor ES status&lt;/li&gt;&lt;li&gt;Use the Incident Review dashboard to investigate notable events&lt;/li&gt;&lt;li&gt;Take ownership of an incident and move it through the investigation workflow&lt;/li&gt;&lt;li&gt;Create notable events&lt;/li&gt;&lt;li&gt;Suppress notable events&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 3 &amp;ndash; Risk-Based Alerting&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Give an overview of Risk-Based Alerting&lt;/li&gt;&lt;li&gt;View Risk Notables and risk information on the Incident Review dashboard&lt;/li&gt;&lt;li&gt;Explain risk scores and how to change an object&amp;#039;s risk score&lt;/li&gt;&lt;li&gt;Review the Risk Analysis dashboard&lt;/li&gt;&lt;li&gt;Describe annotations&lt;/li&gt;&lt;li&gt;Describe the process for retrieving LDAP data for an asset or identity lookup&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 4 &amp;ndash; Assets &amp;amp; Identities&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Give an overview of the ES Assets and Identities framework&lt;/li&gt;&lt;li&gt;Show examples where asset or identity data is missing from ES dashboards or notable events&lt;/li&gt;&lt;li&gt;View the Asset &amp;amp; Identity Management Interface&lt;/li&gt;&lt;li&gt;View the contents of an asset or identity lookup table&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 5 &amp;ndash; Investigations&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Use investigations to manage incident response activity&lt;/li&gt;&lt;li&gt;Use the investigation workbench to manage, visualize and coordinate incident investigations&lt;/li&gt;&lt;li&gt;Add various items to investigations (notes, action history, collaborators, events, assets, identities, files and URLs)&lt;/li&gt;&lt;li&gt;Use investigation timelines, lists and summaries to document and review breach analysis and mitigation efforts&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 6 &amp;ndash; Security Domain Dashboards&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Describe the ES security domains&lt;/li&gt;&lt;li&gt;Use the Security Domain dashboards to troubleshoot various security threats&lt;/li&gt;&lt;li&gt;Learn how to launch the Security Domain dashboards from Incidents Review and from a notable event Action menu&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 7 &amp;ndash; User Intelligence&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Understand and use user activity analysis&lt;/li&gt;&lt;li&gt;Use investigators to analyze events related to an asset or identity&lt;/li&gt;&lt;li&gt;Use access anomalies to detect suspicious access patterns&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 8 &amp;ndash; Web Intelligence&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Use the web intelligence dashboards to analyze your network environment&lt;/li&gt;&lt;li&gt;Filter and highlight events&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 9 &amp;ndash; Threat Intelligence&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Give an overview of the Threat Intelligence framework and how threat intel is configured in ES&lt;/li&gt;&lt;li&gt;Use the Threat Activity dashboard to see which threat sources are interacting with your environment&lt;/li&gt;&lt;li&gt;Use the Threat Artifacts dashboard to examine the status of threat intelligence information in your environment&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 10 &amp;ndash; Protocol Intelligence&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Explain how network data is input into Splunk events&lt;/li&gt;&lt;li&gt;Describe stream events&lt;/li&gt;&lt;li&gt;Give an overview of the Protocol Intelligence dashboards and how they can be used to analyze network data&lt;/li&gt;&lt;/ul&gt;</contents><outline>&lt;p&gt;&lt;strong&gt;Module 1 - Getting Started with ES&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Describe the features and capabilities of Splunk Enterprise Security (ES)&lt;/li&gt;&lt;li&gt;Explain how ES helps security practitioners prevent, detect, and respond to threats&lt;/li&gt;&lt;li&gt;Describe correlation searches, data models and notable events&lt;/li&gt;&lt;li&gt;Describe user roles in ES&lt;/li&gt;&lt;li&gt;Log into Splunk Web and access Splunk for Enterprise Security&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 2 - Security Monitoring and Incident Investigation&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Use the Security Posture dashboard to monitor ES status&lt;/li&gt;&lt;li&gt;Use the Incident Review dashboard to investigate notable events&lt;/li&gt;&lt;li&gt;Take ownership of an incident and move it through the investigation workflow&lt;/li&gt;&lt;li&gt;Create notable events&lt;/li&gt;&lt;li&gt;Suppress notable events&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 3 &amp;ndash; Risk-Based Alerting&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Give an overview of Risk-Based Alerting&lt;/li&gt;&lt;li&gt;View Risk Notables and risk information on the Incident Review dashboard&lt;/li&gt;&lt;li&gt;Explain risk scores and how to change an object&amp;#039;s risk score&lt;/li&gt;&lt;li&gt;Review the Risk Analysis dashboard&lt;/li&gt;&lt;li&gt;Describe annotations&lt;/li&gt;&lt;li&gt;Describe the process for retrieving LDAP data for an asset or identity lookup&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 4 &amp;ndash; Assets &amp;amp; Identities&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Give an overview of the ES Assets and Identities framework&lt;/li&gt;&lt;li&gt;Show examples where asset or identity data is missing from ES dashboards or notable events&lt;/li&gt;&lt;li&gt;View the Asset &amp;amp; Identity Management Interface&lt;/li&gt;&lt;li&gt;View the contents of an asset or identity lookup table&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 5 &amp;ndash; Investigations&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Use investigations to manage incident response activity&lt;/li&gt;&lt;li&gt;Use the investigation workbench to manage, visualize and coordinate incident investigations&lt;/li&gt;&lt;li&gt;Add various items to investigations (notes, action history, collaborators, events, assets, identities, files and URLs)&lt;/li&gt;&lt;li&gt;Use investigation timelines, lists and summaries to document and review breach analysis and mitigation efforts&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 6 &amp;ndash; Security Domain Dashboards&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Describe the ES security domains&lt;/li&gt;&lt;li&gt;Use the Security Domain dashboards to troubleshoot various security threats&lt;/li&gt;&lt;li&gt;Learn how to launch the Security Domain dashboards from Incidents Review and from a notable event Action menu&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 7 &amp;ndash; User Intelligence&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Understand and use user activity analysis&lt;/li&gt;&lt;li&gt;Use investigators to analyze events related to an asset or identity&lt;/li&gt;&lt;li&gt;Use access anomalies to detect suspicious access patterns&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 8 &amp;ndash; Web Intelligence&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Use the web intelligence dashboards to analyze your network environment&lt;/li&gt;&lt;li&gt;Filter and highlight events&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 9 &amp;ndash; Threat Intelligence&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Give an overview of the Threat Intelligence framework and how threat intel is configured in ES&lt;/li&gt;&lt;li&gt;Use the Threat Activity dashboard to see which threat sources are interacting with your environment&lt;/li&gt;&lt;li&gt;Use the Threat Artifacts dashboard to examine the status of threat intelligence information in your environment&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 10 &amp;ndash; Protocol Intelligence&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Explain how network data is input into Splunk events&lt;/li&gt;&lt;li&gt;Describe stream events&lt;/li&gt;&lt;li&gt;Give an overview of the Protocol Intelligence dashboards and how they can be used to analyze network data&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>- ES concepts, features, and capabilities
- Security monitoring and Incident investigation
- Use risk-based alerting and risk analysis
- Assets and identities overview
- Creating investigations and using the Investigation Workbench
- Detecting known types of threats
- Monitoring for new types of threats
- Using analytical tools and dashboards
- Analyze user behavior for insider threats
- Use threat intelligence tools
- Use protocol intelligence</objective_plain><essentials_plain>To be successful, students should have a solid understanding of the following courses:


- Intro to Splunk
- Intro to Splunk (ITS)
- Using Fields (SUF)
- Visualizations (SVZ)
- Search Under the Hood (SUH)
- Intro to Knowledge Objects (IKO)
- Introduction to Dashboards (ITD)</essentials_plain><contents_plain>Module 1 - Getting Started with ES



- Describe the features and capabilities of Splunk Enterprise Security (ES)
- Explain how ES helps security practitioners prevent, detect, and respond to threats
- Describe correlation searches, data models and notable events
- Describe user roles in ES
- Log into Splunk Web and access Splunk for Enterprise Security
Module 2 - Security Monitoring and Incident Investigation



- Use the Security Posture dashboard to monitor ES status
- Use the Incident Review dashboard to investigate notable events
- Take ownership of an incident and move it through the investigation workflow
- Create notable events
- Suppress notable events
Module 3 – Risk-Based Alerting



- Give an overview of Risk-Based Alerting
- View Risk Notables and risk information on the Incident Review dashboard
- Explain risk scores and how to change an object's risk score
- Review the Risk Analysis dashboard
- Describe annotations
- Describe the process for retrieving LDAP data for an asset or identity lookup
Module 4 – Assets &amp; Identities



- Give an overview of the ES Assets and Identities framework
- Show examples where asset or identity data is missing from ES dashboards or notable events
- View the Asset &amp; Identity Management Interface
- View the contents of an asset or identity lookup table
Module 5 – Investigations



- Use investigations to manage incident response activity
- Use the investigation workbench to manage, visualize and coordinate incident investigations
- Add various items to investigations (notes, action history, collaborators, events, assets, identities, files and URLs)
- Use investigation timelines, lists and summaries to document and review breach analysis and mitigation efforts
Module 6 – Security Domain Dashboards



- Describe the ES security domains
- Use the Security Domain dashboards to troubleshoot various security threats
- Learn how to launch the Security Domain dashboards from Incidents Review and from a notable event Action menu
Module 7 – User Intelligence



- Understand and use user activity analysis
- Use investigators to analyze events related to an asset or identity
- Use access anomalies to detect suspicious access patterns
Module 8 – Web Intelligence



- Use the web intelligence dashboards to analyze your network environment
- Filter and highlight events
Module 9 – Threat Intelligence



- Give an overview of the Threat Intelligence framework and how threat intel is configured in ES
- Use the Threat Activity dashboard to see which threat sources are interacting with your environment
- Use the Threat Artifacts dashboard to examine the status of threat intelligence information in your environment
Module 10 – Protocol Intelligence



- Explain how network data is input into Splunk events
- Describe stream events
- Give an overview of the Protocol Intelligence dashboards and how they can be used to analyze network data</contents_plain><outline_plain>Module 1 - Getting Started with ES



- Describe the features and capabilities of Splunk Enterprise Security (ES)
- Explain how ES helps security practitioners prevent, detect, and respond to threats
- Describe correlation searches, data models and notable events
- Describe user roles in ES
- Log into Splunk Web and access Splunk for Enterprise Security
Module 2 - Security Monitoring and Incident Investigation



- Use the Security Posture dashboard to monitor ES status
- Use the Incident Review dashboard to investigate notable events
- Take ownership of an incident and move it through the investigation workflow
- Create notable events
- Suppress notable events
Module 3 – Risk-Based Alerting



- Give an overview of Risk-Based Alerting
- View Risk Notables and risk information on the Incident Review dashboard
- Explain risk scores and how to change an object's risk score
- Review the Risk Analysis dashboard
- Describe annotations
- Describe the process for retrieving LDAP data for an asset or identity lookup
Module 4 – Assets &amp; Identities



- Give an overview of the ES Assets and Identities framework
- Show examples where asset or identity data is missing from ES dashboards or notable events
- View the Asset &amp; Identity Management Interface
- View the contents of an asset or identity lookup table
Module 5 – Investigations



- Use investigations to manage incident response activity
- Use the investigation workbench to manage, visualize and coordinate incident investigations
- Add various items to investigations (notes, action history, collaborators, events, assets, identities, files and URLs)
- Use investigation timelines, lists and summaries to document and review breach analysis and mitigation efforts
Module 6 – Security Domain Dashboards



- Describe the ES security domains
- Use the Security Domain dashboards to troubleshoot various security threats
- Learn how to launch the Security Domain dashboards from Incidents Review and from a notable event Action menu
Module 7 – User Intelligence



- Understand and use user activity analysis
- Use investigators to analyze events related to an asset or identity
- Use access anomalies to detect suspicious access patterns
Module 8 – Web Intelligence



- Use the web intelligence dashboards to analyze your network environment
- Filter and highlight events
Module 9 – Threat Intelligence



- Give an overview of the Threat Intelligence framework and how threat intel is configured in ES
- Use the Threat Activity dashboard to see which threat sources are interacting with your environment
- Use the Threat Artifacts dashboard to examine the status of threat intelligence information in your environment
Module 10 – Protocol Intelligence



- Explain how network data is input into Splunk events
- Describe stream events
- Give an overview of the Protocol Intelligence dashboards and how they can be used to analyze network data</outline_plain><duration unit="d" days="2">2 jours</duration><pricelist><price country="US" currency="USD">1500.00</price><price country="GB" currency="GBP">1250.00</price><price country="SI" currency="EUR">1500.00</price><price country="PL" currency="USD">1500.00</price><price country="DE" currency="EUR">1500.00</price><price country="AT" currency="EUR">1500.00</price><price country="SE" currency="EUR">1500.00</price><price country="FR" currency="EUR">1500.00</price><price country="IT" currency="USD">1500.00</price><price country="CA" currency="CAD">2070.00</price><price country="CH" currency="CHF">1650.00</price><price country="NL" currency="EUR">1500.00</price></pricelist><miles><milesvalue country="CA" vendorcurrency="SPC" vendorcurrencyname="Splunk Training Units">150.00</milesvalue><milesvalue country="US" vendorcurrency="SPC" vendorcurrencyname="Splunk Training Units">150.00</milesvalue><milesvalue country="GB" vendorcurrency="SPC" vendorcurrencyname="Splunk Training Units">150.00</milesvalue><milesvalue country="SI" vendorcurrency="SPC" vendorcurrencyname="Splunk Training Units">150.00</milesvalue><milesvalue country="PL" vendorcurrency="SPC" vendorcurrencyname="Splunk Training Units">150.00</milesvalue><milesvalue country="DE" vendorcurrency="SPC" vendorcurrencyname="Splunk Training Units">150.00</milesvalue><milesvalue country="IT" vendorcurrency="SPC" vendorcurrencyname="Splunk Training Units">150.00</milesvalue><milesvalue country="CH" vendorcurrency="SPC" vendorcurrencyname="Splunk Training Units">150.00</milesvalue><milesvalue country="AT" vendorcurrency="SPC" vendorcurrencyname="Splunk Training Units">150.00</milesvalue><milesvalue country="NL" vendorcurrency="SPC" vendorcurrencyname="Splunk Training Units">150.00</milesvalue></miles></course>