Splunk Enterprise Security is a premium application used within the Splunk deployment to help with SOC operations. This course will teach you how to plan for, design, and deploy the application to use in your environment.
Splunk Enterprise Security (ES) solves many problems within our SOCs including efficient operations. In this course, Planning, Deploying, and Configuring Splunk Enterprise Security, you’ll learn how to get this application installed and configured quickly. First, you’ll explore the design process and learn how all of the design considerations in a Splunk ES deployment. Next, you’ll discover how to prepare your environment for a Splunk Enterprise Security deployment. Finally, you’ll learn how to configure the tool and all of the applicable data modifications you’ll need to make. When you’re finished with this course, you’ll have the skills and knowledge of Splunk Enterprise Security needed to get it up and running.
Joe is a Network Consulting Engineer and has worked in the IT industry since 2010. He has experience in teaching and mentoring IT professionals in both DoD environments and in the civilian sector, in both the networking and IT security fields.
Course Overview Hi everyone. My name is Joe Abraham, and welcome to my course, Planning, Deploying, and Configuring Splunk Enterprise Security. I'm currently a network security consultant and a Pluralsight author with courses in the IT operations and cybersecurity domains. Are you trying to get your SOC the tools that it needs to properly threat hunt, correlate events, and investigate attacks? Do you want to design, plan for, and deploy Splunk Enterprise Security? Well, in this course, we'll get that done. I'll help you learn all about these aspects of Splunk Enterprise Security and how to configure it so that you can better your security posture, increase your efficiency, and investigate properly. Some of the major topics that we will cover include designing a Splunk Enterprise Security deployment, planning for and installing Splunk Enterprise Security, and configuring Splunk Enterprise Security settings. By the end of this course, you'll know all about the application's design recommendations and prerequisites, and you'll be able to jump in and start using it to check out your security posture. Before beginning this course, you should be familiar with basic IT terminology and have a desire to learn more about the security tool. Knowledge of machine data would help out as well. From here, you should feel comfortable diving further into the Splunk Enterprise Security tool and start navigating through customizing the data inputs and features within the application as we continue down this and other Splunk learning paths at Pluralsight. I hope you'll join me on this journey to learn more about the Splunk Enterprise Security application with the Planning, Deploying, and Configuring Splunk Enterprise Security course, at Pluralsight.