Splunk Accredited ES Implementation - Splunk Accreditation Tracks
16332
page-template-default,page,page-id-16332,page-child,parent-pageid-16296,ajax_fade,page_not_loaded,,qode-theme-ver-1.5,wpb-js-composer js-comp-ver-4.3.5,vc_responsive

Splunk Accredited ES Implementation

This learning path provides guidance to help consultants design and implement Splunk Enterprise Security (ES) following best practices. It covers how to onboard data following Splunk’s Common Information Model (CIM), correctly install ES and configure it with necessary correlation data, and implement basic security use cases in the ES product.

Learning Path
Certification Exam - Splunk Core Certified Consultant
Implementation Fundamentals

To achieve Core Implementation Accreditation you need to have gained your Implementation Fundamentals Accreditation.
You will then need to complete the following virtual instructor led course, there is no free self-paced e-learning option for this class.

Core Implementation

To achieve ES Implementation Accreditation you need to have gained your Core Implementation Accreditation.
You will then need to complete the following virtual instructor led course, there is no free self-paced e-learning option for this class.

Using Splunk Enterprise Security

This 3 virtual day course (13.5 hours) prepares security practitioners to track security incidents, analyse security risks, use predictive analytics, and threat discovery. It covers the use of Enterprise Security’s dashboards, forms and workflow to identify, find root cause and resolve security issues.

Administering Enterprise Security

This 13.5 hour course prepares architects and systems administrators to install, configure and manage Splunk Enterprise Security. It covers ES event processing and normalization, deployment requirements, technology add-ons, settings, risk analysis settings, threat intelligence and protocol intelligence configuration, and customizations.

Splunk Enablement Content
  • ES Implementation Course Overview
  • Introduction to Basic Security Principles
  • Splunk Validated Architecture, Sizing Calculators, and Prescriptive Value Paths
  • Installing Splunk for ES
  • Onboarding Data
  • Installing ES with the Best Practices Deployment Guide
  • ES Under-the-Hood Part 1
  • ES Under-the-Hood Part 2
  • ES Frameworks
  • ES Integrations
  • Configuring ES with the Best Practices Deployment Guide
  • Splunk Security Use Cases
  • Risk Based Alerting
  • MITRE ATT&CK
  • Upgrading ES
  • Troubleshooting ES
  • ES Implementation Accreditation Practice Lab 1
  • ES Implementation Accreditation Practice Lab 2