SOC Essentials: Investigating and Threat Hunting (SEITH)

 

Course Overview

In this course you will learn and practice how to conduct investigations using Splunk Enterprise Security features, including Risk Based Alerting, through best practices shared by our security champions, and practice some common tasks using Splunk SOAR.

You will also learn about the PEAK Threat Hunting framework and will apply its basic concepts in a hypothesis-driven threat-hunting exercise.

This course is part of a learning path that can help learners prepare for the role of a SOC Analyst and for the Splunk Certified Cybersecurity Defense Analyst.

Moyens Pédagogiques :
  • Quiz pré-formation de vérification des connaissances (si applicable)
  • Réalisation de la formation par un formateur agréé par l’éditeur
  • Formation réalisable en présentiel ou en distanciel
  • Mise à disposition de labs distants/plateforme de lab pour chacun des participants (si applicable à la formation)
  • Distribution de supports de cours officiels en langue anglaise pour chacun des participants
    • Il est nécessaire d'avoir une connaissance de l'anglais technique écrit pour la compréhension des supports de cours
Moyens d'évaluation :
  • Quiz pré-formation de vérification des connaissances (si applicable)
  • Évaluations formatives pendant la formation, à travers les travaux pratiques réalisés sur les labs à l’issue de chaque module, QCM, mises en situation…
  • Complétion par chaque participant d’un questionnaire et/ou questionnaire de positionnement en amont et à l’issue de la formation pour validation de l’acquisition des compétences

Prerequisites

To be successful, students should have a working understanding of the topics covered in the Intro to Splunk course as well as a basic understanding of common cyber technologies and concepts including:

  • Networking concepts and common security tools
  • Common Operating Systems like Windows and Linux

Course Objectives

At the end of this course you should be able to:

  • Describe SIEM best practices and basic operation concepts of Splunk Enterprise Security, including the interaction between CIM, Data Models, and acceleration, and common CIM fields that may be used in investigations
  • Carry out a typical triage and investigation process using Splunk Enterprise Security
  • Describe the purpose of the Asset and Identity, and Threat Intelligence frameworks in ES
  • Define Splunk ES elements like Notable Event, Risk Notable, Adaptive Response Action, Risk Object, and Contributing Events.
  • Identify common built-in dashboards in Enterprise Security and the basic information they contain.
  • Explain the use of SOAR playbooks and list the basic ways they can be triggered from Enterprise Security
  • Explain the essentials of Risk-based Alerting and the Risk framework
  • List the common high-level steps of threat hunting using the PEAK framework and practice some common steps of hypothesis hunting with Splunk.

Prix & Delivery methods

Formation en ligne

Durée
9 heures

Prix
  • sur demande
Formation en salle équipée

Durée
9 heures

Prix
  • sur demande

Actuellement aucune session planifiée