Search Results
13 items found
- Investigating Incidents with Splunk SOAR | INGENIQ
Investigating Incidents with Splunk SOAR Summary This 3 hour course prepares security practitioners to use SOAR to respond to security incidents, investigate vulnerabilities, and take action to mitigate Description SOAR concepts Investigations Running actions and playbooks Case management & workflows Enquiry SOAR investigation concepts ROI view Using the Analyst Queue Using indicators Using search Topic 2 – Working on Events Using the investigation page to work on events Use the heads-up display Set event
- Using Enterprise Security Training delivered by INGENIQ
Take ownership of incidents, and move through the investigation workflow. Use asset and identity investigator swim lanes to analyse security related events. response actions during incident investigation Create notable events Suppress notable events Module Use investigations to manage incident response activity Use the investigation Workbench to manage, visualize and coordinate incident investigations Add various items to investigations (notes, action history, collaborators
- Splunk Users Track | INGENIQ
Users The User Learning path takes you from investigative keyword searches to creating rich reports and
- Kubernetes Monitoring with Splunk | INGENIQ
view cluster data Topic 2: Monitoring Kubernetes with Built-in Content Use the Kubernetes Navigator to investigate Use the Cluster Analyzer to pinpoint the root of some problems Use built-in Kubernetes Dashboards to investigate and troubleshoot Use AutoDetect to investigate and troubleshoot Topic 3: Monitor Kubernetes with Custom
- Administering SOAR Training delivered by INGENIQ
Delivered via virtual classroom or at your site Course Prerequisites Investigating Incidents with Splunk Identify and onboard data into SOAR (Phantom) Work with containers, labels, artifacts, and tags Manage investigations
- Using Splunk IT Service Intelligence Training delivered by INGENIQ
Intelligence - Course Topics ITSI features and User Interface Creating Glass Tables Managing Notable Events Investigating examples of multi – KPI Alerts Describe the notable events workflow Work with notable events Module 4 - Investigating
- Splunk SOAR Certified Automation Developer
Administering Splunk SOAR Investigating Splunk Incidents with SOAR Developing SOAR Playbooks Advanced
- Administering Splunk Enterprise Security Training delivered by INGENIQ
Participant, Splunk Fundamentals 3 Administering Splunk Enterprise Security - Course Topics Monitoring and Investigation Objectives Module 1 – ES Introduction Overview of ES features and concepts Module 2 – Monitoring and Investigation
- Transitioning to Splunk Cloud Training delivered by INGENIQ
Troubleshooting Troubleshooting Splunk deployments Collecting data and use diagnostics or monitoring to investigate
- Implementing Splunk IT Service Intelligence Training delivered by INGENIQ
examples of multi – KPI Alerts Describe the notable events workflow Work with notable events Module 4 - Investigating
- Splunk Cloud Administration Training delivered by INGENIQ
Troubleshooting Troubleshooting Splunk Deployments Collecting data and use diagnostics or monitoring to investigate
- Splunk Education Single Subject Course Training
introduces students to what machine data is and how Splunk can leverage operational intelligence to investigate