SOC Essentials: Investigating and Threat Hunting (SEITH)

 

Course Overview

This course is part of the Defense Analyst learning path and is intended for learners who want to begin or advance a career as a Security Analyst within a SOC, as well as defense engineers and Splunk Enterprise Security or Splunk SOAR administrators who provide support to these roles.

In this course you will learn and practice how to conduct investigations using Splunk Enterprise Security features through best practices shared by our security champions, as well as practice some common analyst automation tasks using Splunk SOAR. You will also learn about the PEAK Threat Hunting framework and will apply its basic concepts in hypothesis-driven and baseline threat-hunting exercises.

Who should attend

  • SOC Analysts
  • Defense Engineers
  • Splunk Admins who support these roles

Prerequisites

To be successful students should have a basic understanding of common cyber technologies and concepts including:

  • OSI Model
  • Networking concepts and common security tools
  • Common Operative Systems like Windows and Linux

The following Splunk courses are also highly recommended:

Course Objectives

At the end of this course you should be able to:

  • Describe SIEM best practices and basic operation concepts of Splunk Enterprise Security, including the interaction between CIM, Data Models, and acceleration, and common CIM fields that may be used in investigations
  • Carry out a typical triage and investigation process using Splunk Enterprise Security
  • Describe the purpose of the Asset and Identity, and Threat Intelligence frameworks in ES
  • Define Splunk ES elements like Notable Event, Risk Notable, Adaptive Response Action, Risk Object, Contributing Events.
  • Identify common built-in dashboards in Enterprise Security and the basic information they contain.
  • Explain the use of SOAR playbooks and list the basic ways they can be triggered from Enterprise Security
  • Explain the essentials of Risk-based Alerting and the Risk framework
  • List the common high-level steps of threat hunting using the PEAK framework and practice some common steps of hypothesis hunting with Splunk.

Prezzo & Delivery methods

Online Training

Durata
9 Ore

Prezzo
  • US $ 1.000,–
Formazione in Aula

Durata
9 Ore

Prezzo
  • Italia: US $ 1.000,–
 

Schedulazione

Data garantita:   Fast Lane garantirà il corso indipendentemente dal numero dei partecipanti
Instructor-led Online Training:   Corso Online con Istruttore If you have any questions about our online courses, feel free to contact us via phone or Email anytime.

Contattaci per avere informazioni sulle date disponibili in Italiano.

Inglese

6 ore spostamento del fuso orario

Online Training Fuso orario: Eastern Standard Time (EST) Lingua Corso: Inglese Erogazione garantita
Online Training Fuso orario: Eastern Standard Time (EST) Lingua Corso: Inglese Erogazione garantita
Online Training Fuso orario: Central Daylight Time (CDT) Lingua Corso: Inglese
Online Training Fuso orario: Central Daylight Time (CDT) Lingua Corso: Inglese
Online Training Fuso orario: Eastern Daylight Time (EDT) Lingua Corso: Inglese
Online Training Fuso orario: Eastern Daylight Time (EDT) Lingua Corso: Inglese
Online Training Fuso orario: Eastern Daylight Time (EDT) Lingua Corso: Inglese
Online Training Fuso orario: Eastern Daylight Time (EDT) Lingua Corso: Inglese

7 ore spostamento del fuso orario

Online Training Fuso orario: Central Standard Time (CST) Lingua Corso: Inglese
Online Training Fuso orario: Central Standard Time (CST) Lingua Corso: Inglese

9 ore spostamento del fuso orario

Online Training Fuso orario: Pacific Daylight Time (PDT) Lingua Corso: Inglese
Online Training Fuso orario: Pacific Daylight Time (PDT) Lingua Corso: Inglese