Administering Splunk Enterprise Security (ASES)

Tijdsduur

Administering Splunk Enterprise Security (ASES)

Fast Lane
Logo van Fast Lane
Opleiderscore: starstarstarstarstar_border 8 Fast Lane heeft een gemiddelde beoordeling van 8 (uit 2 ervaringen)

Tip: meer info over het programma, prijs, en inschrijven? Download de brochure!

Startdata en plaatsen
Er zijn nog geen startdata bekend voor dit product.

Beschrijving

Course Content

This 13.5-hour course prepares Security Administrators and Engineers to install and configure Splunk Enterprise Security (ES). It covers ES event processing and normalization, deployment requirements, technology add-ons, dashboard dependencies, data models, managing risk, and customizing threat intelligence.

Please note that this class may run over three days, with 4.5 hour sessions each day, to achieve the full 13.5 hours of course content.

Prerequisites

To be successful, students should have a solid understanding of the following courses:

  • Using Splunk Enterprise Security (USES)
  • What is Splunk? (Retired)
  • Intro to Splunk
  • Using Fields (SUF)
  • Intro to Knowledge Objects
  • Creati…

Lees de volledige beschrijving

Veelgestelde vragen

Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.

Nog niet gevonden wat je zocht? Bekijk deze onderwerpen: Splunk, IT Beveiliging / Security, Data Analyse, QlikView en Data Analyse Excel.

Course Content

This 13.5-hour course prepares Security Administrators and Engineers to install and configure Splunk Enterprise Security (ES). It covers ES event processing and normalization, deployment requirements, technology add-ons, dashboard dependencies, data models, managing risk, and customizing threat intelligence.

Please note that this class may run over three days, with 4.5 hour sessions each day, to achieve the full 13.5 hours of course content.

Prerequisites

To be successful, students should have a solid understanding of the following courses:

  • Using Splunk Enterprise Security (USES)
  • What is Splunk? (Retired)
  • Intro to Splunk
  • Using Fields (SUF)
  • Intro to Knowledge Objects
  • Creating Knowledge Objects (CKO)
  • Creating Field Extractions (CFE)
  • Enriching Data with Lookups (EDL)
  • Data Models (SDM)
  • Splunk Enterprise System Administration (SESA)
  • Splunk Enterprise Data Administration (SEDA)

Who Should Attend

  • Administrators
  • Engineers

Gedetailleerde cursusinhoud

Module 1 – Introduction to Enterprise Security

  • Review how ES functions
  • Understand how ES uses data models
  • Describe correlation searches, adaptive response actions, and notable events
  • Configure ES roles and permissions

Module 2 – Security Monitoring

  • Customize the Security Posture and Incident Review dashboards
  • Create ad hoc notable events
  • Create notable event suppressions

Module 3 – Risk-Based Alerting

  • Give an overview of Risk-Based Alerting (RBA)
  • Explain risk scores and how they can be changed
  • Review the Risk Analysis dashboard
  • Describe annotations
  • View Risk Notables and risk information

Module 4 – Incident Investigation

  • Review the Investigations dashboard
  • Customize the Investigation Workbench
  • Manage investigations

Module 5 – Installation

  • Give an overview of general ES install requirements
  • Explain the different add-ons and where they are installed
  • Provide ES pre-installation requirements
  • Identify steps for downloading and installing ES

Module 6 – General Configuration

  • Set general configuration options
  • Configure local and cloud domain information
  • Work with the Incident Review KV Store
  • Customize navigation
  • Configure Key Indicator searches

Module 7 – Validating ES Data

  • Verify data is correctly configured for use in ES
  • Validate normalization configurations
  • Install additional add-ons

Module 8 – Custom Add-ons

  • Ingest custom data in ES
  • Create an add-on for a custom sourcetype
  • Describe add-on troubleshooting

Module 9 – Tuning Correlation Searches

  • Describe correlation search operation
  • Customize correlation searches
  • Describe numeric vs. conceptual thresholds

Module 10 – Creating Correlation Searches

  • Create a custom correlation search
  • Manage adaptive responses
  • Export/import content

Module 11 – Asset & Identity Management

  • Review the Asset and Identity Management interface
  • Describe Asset and Identity KV Store collections
  • Configure and add asset and identity lookups to the interface
  • Configure settings and fields for asset and identity lookups
  • Explain the asset and identity merge process
  • Describe the process for retrieving LDAP data for an asset or identity lookup

Module 12 – Managing Threat Intelligence

  • Understand and configure threat intelligence
  • Use the Threat Intelligence Management interface
  • Configure new threat lists

Module 13 – Supplemental Apps

  • Review apps to enhance the capabilities of ES including, Mission Control, SOAR, UBA, Cloud-based Streaming Analytics, PCI Compliance, Fraud Analytics, and Lookup File Editor

Fast Lane werkt met Nederlandse trainers die didactische vaardigheden combineren met veel practische ervaring.

Blijf op de hoogte van nieuwe ervaringen
Er zijn nog geen ervaringen.
Deel je ervaring
Heb je ervaring met deze cursus? Deel je ervaring en help anderen kiezen. Als dank voor de moeite doneert Springest € 1,- aan Stichting Edukans.

Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.

Vraag nu gratis en vrijblijvend informatie aan:

(optioneel)
(optioneel)
(optioneel)
(optioneel)
(optioneel)
We slaan je gegevens op, en delen ze met Fast Lane, om je via e-mail en evt. telefoon verder te helpen. Meer info vind je in ons privacybeleid.