SOC Cybersecurity Threat Hunting with Splunk
- Description
- Curriculum
- FAQ
- Reviews
The SOC Cybersecurity Threat Hunting with Splunk training course has been developed and edited by Mohammad Mirasadollahi in an online format, consisting of 68 instructional videos on Splunk, along with practical course files. The course covers Threat hunting with Splunk from beginner to advanced levels, based on the latest Cybersecurity standard educational topics in the world. It has been published as a practical course on Udemy under the title “SOC Cybersecurity Threat Hunting with Splunk.”
With SOC Cybersecurity Threat Hunting with Splunk course, you will be able to easily identify cyber-attacks using Splunk in any SOC. Learning Threat Hunting with Splunk in SOC is one of the most important skills required by organizations in the field of information security.
The complexity of Cybersecurity attacks in recent years has rendered traditional methods ineffective in detecting advanced Cybersecurity attacks and APT groups. As a result, relying solely on traditional approaches such as firewalls, antivirus software, and EDR is no longer sufficient, and we need cybersecurity experts in the field of threat detection and identification.
Currently, cybersecurity analysts in Security Operations Centers (SOCs) can detect various attacks by analyzing and dissecting events received from different infrastructure and software, relying on their knowledge and various tools.
Cybersecurity experts and analysts require technology for continuous log analysis, which involves aggregating logs in a central system called SIEM (Security Information and Event Management). With the capabilities provided by SIEM, they can detect cyber threats.
SIEMs are referred to as the beating heart of every SOC. Currently, one of the most powerful SIEMs available worldwide, with many followers, is Splunk software.
Splunk is a software used for data storage, search, investigation, and analysis. Cybersecurity experts can use Splunk Enterprise to examine and analyze data, identify patterns, and establish logical connections between data to detect complex Cybersecurity attacks.
Therefore, many organizations are striving to migrate from traditional methods to modern ones for better Cybersecurity attack detection. Due to the importance of cybersecurity experts in data analysis, log and event analysis, and the popularity of Splunk SIEM software, the SOC Cybersecurity Threat Hunting with Splunk training course will cover the techniques of threat hunting, investigation, analysis, and detection of Cybersecurity attacks using Splunk.
-
14Windows Process AnalysisVideo lesson
-
15Basic Malicious Process Hunting with SplunkVideo lesson
-
16Parent and Child Process Tree analysis with SplunkVideo lesson
-
17Hunting Malicious Windows Process CommandLineVideo lesson
-
18Fake Windows Processes HuntingVideo lesson
-
19Process Injection HuntingVideo lesson
-
20What is LSASS ProcessVideo lesson
-
21Create Remote Thread Into LSASSVideo lesson
-
22Access LSASS Memory for Dump CreationVideo lesson
-
23Credential Dumping through LSASS AccessVideo lesson
-
24What is MimikatzVideo lesson
-
25Hunting Mimikatz Using Sysmon and SplunkVideo lesson
-
26Windows Mimikatz Binary Execution Hunting with SplunkVideo lesson
-
27Hunting Mimikatz with Powershell and SplunkVideo lesson
-
28What is Kerberos ProtocolVideo lesson
-
29Kerberoasting Attack Hunting - Part 01Video lesson
-
30Kerberoasting Attack Hunting - Part 02Video lesson
-
31DCSync Attack DetectionVideo lesson
-
32Overpass-the-Hash Attack DetectionVideo lesson
-
33Pass-the-Ticket Attack DetectionVideo lesson
-
34What is NTLM ProtocolVideo lesson
-
35Pass-the-Hash Attack DetectionVideo lesson
-
36Data Science and SplunkVideo lesson
-
37Standard DeviationVideo lesson
-
38Normal Distribution or Gaussian DistributionVideo lesson
-
39Empirical or 68–95–99.7 ruleVideo lesson
-
40ICMP Tunnel Outlier DetectionVideo lesson
-
41Windows Process CommandLine outlier DetectionVideo lesson
-
42SMB Traffic Anomaly DetectionVideo lesson
-
43What is Splunk Machine Learning ToolkitVideo lesson
-
44DNS Outlier Detection with Splunk MLTKVideo lesson
-
45Malware Detection with Cyber Threat IntelligenceVideo lesson
-
46Malware Info EnrichmentVideo lesson
-
47MISP integration with Splunk - Part 01Video lesson
-
48MISP integration with Splunk - Part 02Video lesson
-
49AlienVault OTX Integration with SplunkVideo lesson
-
50VirusTotal Integration with SplunkVideo lesson
-
59PsExec Attack Detection with SplunkVideo lesson
-
60PowerShell spawned Process Lateral movement Detection with SplunkVideo lesson
-
61WMI Lateral Movement Detection with SplunkVideo lesson
-
62WinRM-WinRS Attack Detection with SplunkVideo lesson
-
63Svchost Lolbas Execution Process Spawn with SplunkVideo lesson

External Links May Contain Affiliate Links read more