Splunk for Security Analyst

Splunk for Security Analyst

Learn how to harness Splunk for security investigation.
5/5

Course Description

This self-paced course provides you with a deep understanding of Suricata, an open-source network intrusion detection system (NIDS) that is widely used for monitoring and analyzing network traffic for suspicious activities. The course takes you from the essentials of installation and configuration to advanced threat detection techniques using Suricata’s rule sets, protocols, and logs.

Through hands-on labs and real-world examples, you’ll gain practical skills in creating custom alerts, analyzing packets, and detecting anomalies. Ideal for Security Analysts, SOC teams, and anyone eager to specialize in network security, this course will prepare you to handle network-based threats with expertise.

What You Will Learn

Pre-requisites

Course Content

What is SIEM?         

Introduction to Splunk

Splunk Components

Splunk for SOC Components

Data Pipeline           

Splunk Default Ports 

Splunk App             

Index, Datasets, Sources and Sourcetypes

Installing Splunk on Ubuntu Server

Installing Splunk Security Essentials

Explore Fields

rename

table

Fields

head

Top and rare

stats

timechart

chart

Data Ingestion and Parsing    

Log Analysis

DNS Log Analysis

DHCP Log Analysis

HTTP Log Analysis         

Setting up Splunk UF on Ubuntu Machine      

Task#1: Detection of Unauthorized Access on Linux Blocked by Fail2Ban

Install and set up Fail2ban

Simulate the SSH Brute force attack

Analyzing logs on Splunk       

Task #2: Monitoring and Investigating Suspicious Process Execution

Install Sysmon for Linux            

Setting up Splunk UF and Splunk Dashboard

Simulate a Suspicious Process Execution attack & Analyzing logs on Splunk

Task#3: File Integrity Monitoring for Sensitive Directories       

Installing and setting up Auditd

Setting up Splunk          

Simulate Unauthorized change attempt & Analyzing logs on Splunk

Setting up Windows Server 2022     

Installing and setting up Splunk Universal Forwarder on Windows Server 2022

Installing Sysmon

Setting up Splunk

Simulate the attack and Visualize on Splunk Dashboard      

Task 2: Investigating PowerShell Abuse on Windows Machines

Setting up Splunk           

Simulate the attack and Visualize on Splunk Dashboard

Task 3: Monitoring Windows Registry Changes

Setting up Splunk      

Simulate the attack and Visualize on Splunk Dashboard

Find Users IP Address    

Discover List of Website visited by a suspicious user

Detecting Malicious Network Scanner

Setting up Splunk

Finding Malicious Traffic: Analyzing Connection to Specific domains

Detecting Data Exfiltration

Detecting Suspicious User Agent          

Monitor for connections to potentially phishing-related URLs

Detect Successful use logins

Detect repeated failed login attempts  

Detect Local group membership changes

Detect Process Creation using certain accounts

Instructor

Rajneesh Gupta

Senior Security Consultant

This course includes:

Testimonial

What alumni say about us

Common Questions

Most Popular Questions

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

What is Suricata, and how does it work?

Suricata is an open-source network intrusion detection and prevention system (NIDS/NIPS) that monitors network traffic for suspicious activities. Using rules and protocol analysis, it can detect malicious patterns and alert security teams to potential threats.

Is prior experience with Suricata required?

No previous experience is needed. This course covers Suricata from the ground up, including installation, configuration, and advanced techniques. Basic networking knowledge is recommended, but we provide foundational lessons to ensure a smooth learning experience.

How long does the course take to complete?

The course is self-paced, so completion time varies. Most students complete it within 4-6 weeks, but you’ll have lifetime access to revisit modules as needed.

What practical skills will I gain?

By the end of the course, you’ll be able to set up and configure Suricata, create custom detection rules, analyze network traffic for threats, integrate with SIEM tools, and apply Suricata in real-world threat hunting scenarios. These skills are crucial for network security and SOC roles.

Does the course content cover the latest version of Suricata?

Yes, we update the course regularly to reflect the latest Suricata features and capabilities. The course content is aligned with the most current version, so you’ll learn the latest techniques and best practices.

Will I receive a certificate upon completion?

Yes, you’ll receive a certificate from HaxSecurity upon completion, which you can display on LinkedIn and add to your resume to showcase your Suricata skills.

What resources or equipment will I need?

You’ll need a computer with Suricata installed, ideally on a virtual or physical Linux environment. Detailed installation instructions and setup support are included in the course.

What support is available during the course?

Our support team is available to help with technical questions, and we offer a discussion forum for learners to interact with each other. Additionally, Rajneesh hosts regular live Q&A sessions where you can ask specific questions and gain further insights into the material.

Featured Online Course

Stay ahead with content based on the latest industry trends and practices.