Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Configuring Threat Intelligence in Splunk Enterprise Security

Course Cover
compare button icon

Course Features

icon

Duration

104 minutes

icon

Delivery Method

Online

icon

Available on

Downloadable Courses

icon

Accessibility

Mobile, Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Self Paced

icon

Video Content

104 minutes

Course Description

Splunk Enterprise Security is a comprehensive solution for addressing various issues in Security Operations Centers (SOCs), enabling efficient operations. In the course "Configuring Threat Information in Splunk Enterprise Security," you will learn how to gather threat intelligence from different sources. The course covers topics such as threat intelligence delivery in different formats, the Splunk Threat Intelligence Framework, and the available threat intelligence tools within the application.

By attending this course, you will gain knowledge on configuring threat intelligence sources and analyzing the data to obtain relevant information for Splunk Enterprise Security. The course also emphasizes understanding threat intelligence technology and its role in cyber security. Additionally, it covers network intelligence and securing Splunk Enterprise.

This course is ideal for individuals seeking to enhance their skills in security intelligence, cyber security intelligence, and intelligent cyber security. It also provides valuable insights for those interested in obtaining a certification in cyber threat intelligence.

To summarize, "Configuring Threat Information in Splunk Enterprise Security" offers a comprehensive understanding of threat intelligence in the context of cyber security. It equips learners with the necessary skills to configure security settings, analyze threat information, and effectively utilize Splunk Enterprise Security for enhanced SOC operations.

Course Overview

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Instructor-Moderated Discussions

projects-img

Case Studies, Captstone Projects

Skills You Will Gain

What You Will Learn

Learn how to get this information into the tool from various sources

First, you’ll learn about threat intelligence and the different formats it comes in

Next, you’ll learn about the Splunk Threat Intelligence Framework and how to use it in order to enrich your data

You’ll look at the threat intelligence tools that we can use in the application as well

Finally, you’ll learn how to configure the threat intelligence sources and parse the data in order to get what you need for Splunk Enterprise Security

Course Instructors

Author Image

Joe Abraham

Instructor

Joe Abraham, CCIE #62417, is a Network Security Consultant working in the public sector space, assisting customers develop and implement functional and secure network architectures. He graduated from...
Course Cover