Planning, Deploying, and Configuring Splunk Enterprise Security
By Joe Abraham
Course info



Course info



Description
Splunk Enterprise Security (ES) solves many problems within our SOCs including efficient operations. In this course, Planning, Deploying, and Configuring Splunk Enterprise Security, you’ll learn how to get this application installed and configured quickly. First, you’ll explore the design process and learn how all of the design considerations in a Splunk ES deployment. Next, you’ll discover how to prepare your environment for a Splunk Enterprise Security deployment. Finally, you’ll learn how to configure the tool and all of the applicable data modifications you’ll need to make. When you’re finished with this course, you’ll have the skills and knowledge of Splunk Enterprise Security needed to get it up and running.
Section Introduction Transcripts
Course Overview
Hi everyone. My name is Joe Abraham, and welcome to my course, Planning, Deploying, and Configuring Splunk Enterprise Security. I'm currently a network security consultant and a Pluralsight author with courses in the IT operations and cybersecurity domains. Are you trying to get your SOC the tools that it needs to properly threat hunt, correlate events, and investigate attacks? Do you want to design, plan for, and deploy Splunk Enterprise Security? Well, in this course, we'll get that done. I'll help you learn all about these aspects of Splunk Enterprise Security and how to configure it so that you can better your security posture, increase your efficiency, and investigate properly. Some of the major topics that we will cover include designing a Splunk Enterprise Security deployment, planning for and installing Splunk Enterprise Security, and configuring Splunk Enterprise Security settings. By the end of this course, you'll know all about the application's design recommendations and prerequisites, and you'll be able to jump in and start using it to check out your security posture. Before beginning this course, you should be familiar with basic IT terminology and have a desire to learn more about the security tool. Knowledge of machine data would help out as well. From here, you should feel comfortable diving further into the Splunk Enterprise Security tool and start navigating through customizing the data inputs and features within the application as we continue down this and other Splunk learning paths at Pluralsight. I hope you'll join me on this journey to learn more about the Splunk Enterprise Security application with the Planning, Deploying, and Configuring Splunk Enterprise Security course, at Pluralsight.