kingers Posted April 23 Report Share Posted April 23 Soc Cybersecurity Threat Hunting With Splunk Published 4/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 5.40 GB[/center] | Duration: 2h 34m Threat Hunting with Splunk SIEM for Cybersecurity Analysis and SOC Analysts What you'll learn Threat Hunting with Splunk Knowledge APT Analysis Integrating Different Software with Splunk Find 0-Day Cyber Threats with Data Science and Splunk Requirements Basic Knowledge of Network and Cybersecurity Basic Knowledge of Splunk Search Processing Language (SPL) Description The SOC Cybersecurity Threat Hunting with Splunk training course has been developed and edited by Mohammad Mirasadollahi in an online format, consisting of 68 instructional videos on Splunk, along with practical course files. The course covers Threat hunting with Splunk from beginner to advanced levels, based on the latest Cybersecurity standard educational topics in the world. It has been published as a practical course on Udemy under the title "SOC Cybersecurity Threat Hunting with Splunk."With SOC Cybersecurity Threat Hunting with Splunk course, you will be able to easily identify cyber-attacks using Splunk in any SOC. Learning Threat Hunting with Splunk in SOC is one of the most important skills required by organizations in the field of information security.The complexity of Cybersecurity attacks in recent years has rendered traditional methods ineffective in detecting advanced Cybersecurity attacks and APT groups. As a result, relying solely on traditional approaches such as firewalls, antivirus software, and EDR is no longer sufficient, and we need cybersecurity experts in the field of threat detection and identification.Currently, cybersecurity analysts in Security Operations Centers (SOCs) can detect various attacks by analyzing and dissecting events received from different infrastructure and software, relying on their knowledge and various tools.Cybersecurity experts and analysts require technology for continuous log analysis, which involves aggregating logs in a central system called SIEM (Security Information and Event Management). With the capabilities provided by SIEM, they can detect cyber threats.SIEMs are referred to as the beating heart of every SOC. Currently, one of the most powerful SIEMs available worldwide, with many followers, is Splunk software.Splunk is a software used for data storage, search, investigation, and analysis. Cybersecurity experts can use Splunk Enterprise to examine and analyze data, identify patterns, and establish logical connections between data to detect complex Cybersecurity attacks.Therefore, many organizations are striving to migrate from traditional methods to modern ones for better Cybersecurity attack detection. Due to the importance of cybersecurity experts in data analysis, log and event analysis, and the popularity of Splunk SIEM software, the SOC Cybersecurity Threat Hunting with Splunk training course will cover the techniques of threat hunting, investigation, analysis, and detection of Cybersecurity attacks using Splunk. Overview Section 1: Introduction - Welcome Lecture 1 Introduction - Welcome Section 2: Threat Hunting Lab Setup with Splunk Lecture 2 Splunk installation from scratch Lecture 3 Splunk bulk Apps and Addons Installation Lecture 4 Splunk Boss of The SOC (BOTS) Installation Lecture 5 Import Lab Attacks Data to Splunk Section 3: Base Knowledge for Splunk and Threat Hunting Lecture 6 What is Splunk Lecture 7 What is Indicator of Compromise (IoC) Lecture 8 Cyber Kill Chain and MITRE ATT&CK Section 4: Basic Attacks Hunting with Splunk Lecture 9 Large Web Upload Hunting Lecture 10 Hunting with Top and Rare Commands Lecture 11 Network Connections Hunting with Splunk Lecture 12 Basic Scanning Detection with Splunk Lecture 13 Brute Force Attack Detection with Splunk Section 5: Windows Attacks Detection with Splunk Lecture 14 Windows Process Analysis Lecture 15 Basic Malicious Process Hunting with Splunk Lecture 16 Parent and Child Process Tree analysis with Splunk Lecture 17 Hunting Malicious Windows Process CommandLine Lecture 18 Fake Windows Processes Hunting Lecture 19 Process Injection Hunting Lecture 20 What is LSASS Process Lecture 21 Create Remote Thread Into LSASS Lecture 22 Access LSASS Memory for Dump Creation Lecture 23 Credential Dumping through LSASS Access Lecture 24 What is Mimikatz Lecture 25 Hunting Mimikatz Using Sysmon and Splunk Lecture 26 Windows Mimikatz Binary Execution Hunting with Splunk Lecture 27 Hunting Mimikatz with Powershell and Splunk Section 6: Active Directory Domain Controller Attack Detection with Splunk Lecture 28 What is Kerberos Protocol Lecture 29 Kerberoasting Attack Hunting - Part 01 Lecture 30 Kerberoasting Attack Hunting - Part 02 Lecture 31 DCSync Attack Detection Lecture 32 Overpass-the-Hash Attack Detection Lecture 33 Pass-the-Ticket Attack Detection Lecture 34 What is NTLM Protocol Lecture 35 Pass-the-Hash Attack Detection Section 7: Anomaly Activity Hunting with Data Science and Splunk Lecture 36 Data Science and Splunk Lecture 37 Standard Deviation Lecture 38 Normal Distribution or Gaussian Distribution Lecture 39 Empirical or 68-95-99.7 rule Lecture 40 ICMP Tunnel Outlier Detection Lecture 41 Windows Process CommandLine outlier Detection Lecture 42 SMB Traffic Anomaly Detection Lecture 43 What is Splunk Machine Learning Toolkit Lecture 44 DNS Outlier Detection with Splunk MLTK Section 8: Splunk Integration for Cyber Threat Intelligence Lecture 45 Malware Detection with Cyber Threat Intelligence Lecture 46 Malware Info Enrichment Lecture 47 MISP integration with Splunk - Part 01 Lecture 48 MISP integration with Splunk - Part 02 Lecture 49 AlienVault OTX Integration with Splunk Lecture 50 VirusTotal Integration with Splunk Section 9: Threat Hunting with ChatGPT and Splunk Lecture 51 What is ChatGPT Lecture 52 ChatGPT Integration with Splunk Lecture 53 Threat Hunting with ChatGPT and Splunk Section 10: Malicious Activity Hunting with Splunk and RITA Lecture 54 What is Real Intelligence Threat Analytics (RITA) Lecture 55 RITA Installation and Configuration Lecture 56 Splunk Integration with RITA Lecture 57 Beaconing Detection with RITA and Splunk Lecture 58 DNS Tunneling Detection with RITA and Splunk Section 11: Lateral Movement Detection with Splunk Lecture 59 PsExec Attack Detection with Splunk Lecture 60 PowerShell spawned Process Lateral movement Detection with Splunk Lecture 61 WMI Lateral Movement Detection with Splunk Lecture 62 WinRM-WinRS Attack Detection with Splunk Lecture 63 Svchost Lolbas Execution Process Spawn with Splunk Section 12: Persistence Hunting with Splunk Lecture 64 Image File Execution Options Injection with Splunk Lecture 65 Schedule Task with Rundll32 Command Trigger Hunting with Splunk Lecture 66 Sc Exe Manipulating Windows Services Hunting with Splunk Lecture 67 Time Provider Persistence Registry Hunting with Splunk Lecture 68 ETW Registry Disabled Hunting with Splunk Security Operations Center (SOC) analysts,Cybersecurity Threat Hunters,Splunk Engineers,Threat Intelligence Analysts,DFIRshttps://voltupload.com/rprl9orwqvb6/SOC_Cybersecurity_Threat_Hunting_with_Splunk.z01https://voltupload.com/9h3xw3qewn4h/SOC_Cybersecurity_Threat_Hunting_with_Splunk.ziphttps://rapidgator.net/file/6bf4fa737f4cf1bced15acb5bb75bacf/SOC_Cybersecurity_Threat_Hunting_with_Splunk.z01https://rapidgator.net/file/63206e6bb33f63039fed57fad234c622/SOC_Cybersecurity_Threat_Hunting_with_Splunk.zipFree search engine download: SOC Cybersecurity Threat Hunting with Splunk Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now