![]() Leverages Splunk's powerful search capabilities.Built on the Splunk Operational Intelligence platform – ES is a Splunk app, installed on a Splunk server.All rights reserved | 17 August 2017 Overview of Splunk Enterprise Security In the second part, the details of deployment, installation and configuration are discussed – Focus is on how to get the system up and running, and tune it for site requirements Generated for Thippesha Jyothi ( ) (C) Splunk Inc, not for Administering distribution Splunk Enterprise Security 8 Copyright © 2017 Splunk, Inc.In the first part of the course, a very high-level overview of the ES features that are used by security practitioners are discussed – Focus is on how the product works for end-users.This course is for consultants and administrators who will be planning, installing, or configuring ES.All rights reserved | 17 August 2017 Course Overview Log on to ES Generated for Thippesha Jyothi ( ) (C) Splunk Inc, not for Administering distribution Splunk Enterprise Security 7 Copyright © 2017 Splunk, Inc.Describe correlation searches and notable events.Explain how ES helps security practitioners detect, prevent, and respond to threats.Describe the features and capabilities of Splunk Enterprise Security (ES). ![]() All rights reserved | 17 August 2017 Objectives All rights reserved | 17 August 2017 Module 1: Introduction to ES Generated for Thippesha Jyothi ( ) (C) Splunk Inc, not for Administering distribution Splunk Enterprise Security 6 Copyright © 2017 Splunk, Inc. Threat Intelligence Framework Generated for Thippesha Jyothi ( ) (C) Splunk Inc, not for Administering distribution Splunk Enterprise Security 5 Copyright © 2017 Splunk, Inc. Security Monitoring and Incident Investigation 8. All rights reserved | 17 August 2017 Course Outline 1. Configure the ES threat intelligence framework Generated for Thippesha Jyothi ( ) (C) Splunk Inc, not for Administering distribution Splunk Enterprise Security 4 Copyright © 2017 Splunk, Inc.Examine deployment requirements for ES installations.Understand basics of ES end-user features.All rights reserved | 17 August 2017 Course Goals ![]() Recommended: – One of either: ê Searching and Reporting with Splunk and Splunk Knowledge Objects ê Splunk Fundamentals 1 & Splunk Fundamentals 2 – Splunk Cluster Administration – Architecting and Deploying Splunk Generated for Thippesha Jyothi ( ) (C) Splunk Inc, not for Administering distribution Splunk Enterprise Security 3 Copyright © 2017 Splunk, Inc.Administering Splunk (Data and System). ![]() All rights reserved | 17 August 2017 Course Prerequisites
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |