Arrow Electronics, Inc.

SOC Essentials: Investigating and Threat Hunting

CODE: SPL_SOCINVTHR

LENGTH: 16 Hours (2 days)

PRICE: kr11 781,00

Description

In this course you will learn and practice how to conduct investigations using Splunk Enterprise Security features, including Risk Based Alerting, through best practices shared by our security champions, and practice some common tasks using Splunk SOAR. You will also learn about the PEAK Threat Hunting framework and will apply its basic concepts in a hypothesis-driven threat-hunting exercise.

Objectives

At the end of this course you should be able to:

▪ Describe SIEM best practices and basic operation concepts of

Splunk Enterprise Security, including the interaction between

CIM, Data Models, and acceleration, and common CIM fields that

may be used in investigations

▪ Carry out a typical triage and investigation process using Splunk

Enterprise Security

▪ Describe the purpose of the Asset and Identity, and Threat

Intelligence frameworks in ES

▪ Define Splunk ES elements like Notable Event, Risk Notable,

Adaptive Response Action, Risk Object, and Contributing Events.


▪ Identify common built-in dashboards in Enterprise Security and

the basic information they contain.


▪ Explain the use of SOAR playbooks and list the basic ways they

can be triggered from Enterprise Security


▪ Explain the essentials of Risk-based Alerting and the Risk

framework


▪ List the common high-level steps of threat hunting using the

PEAK framework and practice some common steps of hypothesis

hunting with Splunk.

Prerequisites

To be successful, students should have a working understanding of the topics covered in the Intro to Splunk course as well as a basic understanding of common cyber technologies and concepts including:

▪ Networking concepts and common security tools

▪ Common Operating Systems like Windows and Linux

Programme

▪ Introduction

o The CyberSecurity Defense Analyst

o CIM, Data Models and Correlation Refresh

o Lab 1: Introducing the environment

▪ Splunk Enterprise Security (ES) for Analysts

o What is SIEM again?

o Asset & Identity Framework

o Threat Intelligence Framework

o Notable Event FrameworkAdaptive Response Framework

o Incident Investigation Management in Splunk ES

o Lab 2: Pick up an Investigation

▪ Risk Analysis Framework

o Overview

o Lab 3: Continue your investigation with RBA

▪ Working with Splunk SOAR

o Introducing Splunk SOAR

o Lab 4: Splunk SOAR practice

▪ Threat Hunting with PEAK

o PEAK Overview

o Lab 5: Threat Hunting Hands-on

▪ Challenge Lab

o Lab 6: Run your own investigation

Follow on courses

This course is part of a learning path that can help learners prepare for the role of a SOC Analyst and for the  Splunk Certified Cybersecurity Defense Analyst exam.

Explore other courses in this learning path:

1. The Cybersecurity Landscape

2. Understanding Threats and Attacks

3. Security Operations and the Defense Analyst

4. Data and tools for Defense

5. The Art of Investigation

It is recommended that you review the full exam blueprint when preparing for the exam.

Further Information

This is an instructor-led course with lab exercises that will challenge

the student to practice what they learned.

This lab experience is using the following Splunk tools:

▪ Splunk Enterprise Version: 9.1.1

▪ Enterprise Security (ES) Version: 7.3.1

▪ Splunk SOAR Version: 6.2.0.355


Estimated completion time:

▪ 9 hours

Session Dates