Leader in the cybersecurity training sector.

Collecting and analysing logs with Splunk

Catégorie
Satisfaction rate
4.8
Success rate
4.9

Optimising the use of machine and log data

The target audience for training

  • Systems and network administrators

What you will learn

This course will take you through the techniques needed to audit an iOS mobile application, as well as the most common vulnerabilities in this type of application.

Whether you're a technical auditor or a developer, you need to know about bad security practices and exploitation techniques. Come and learn more about the vulnerabilities associated with this platform in this training course!

This course will show you advanced auditing methods for Android mobile applications.

The aim of the course is to go beyond the "Introduction" course. This course is entirely practical.

Training programme

Module 1: Installing Splunk; retrieving/injecting data
  • Big Data concepts
  • Installing Splunk on Windows
  • Index files and directories via the web interface
  • Implementation of the Universal Forwarder
  • Index management
  • Data retention period
  • Practical work: installing and configuring Splunk; using Universal Forwarder to retrieve Apache/Linux and Active Directory/Windows logs
  • Queries using Search Processing Language, or SPL, a language developed by Splunk
  • Boolean operators, commands
  • Search using time ranges
  • Practical exercises: implementing the definition of field extractions, event types and labels; processing csv files; extracting statistics from Firewall log files.
  • Dashboards and operational intelligence, bringing out the data
  • Types of graphs
  • Practical work: creating and enhancing a dashboard with graphs linked to the research carried out
  • Advanced SPLLookup commands
  • Produce regular (scheduled) dashboards in PDF format
  • Practical exercises: creating and enhancing a dashboard with graphs linked to the research carried out; creating numerous dashboards based on the analysis of Windows events with a view to attack scenarios.
  • Install an existing Splunk or third-party application
  • Adding dashboards and searches to an application
  • Practical work: creating a new Splunk application; installing an application and viewing network traffic statistics
  • Data models
  • Taking advantage of regular expressions
  • Optimising search performance
  • Rotate data
  • Practical work: using the pivot command and templates to display data
  • Grouping related events, notion of transaction
  • Take advantage of several data sources
  • Identify relationships between fields
  • Predicting future values
  • Uncovering abnormal values
  • Practical work: carrying out in-depth searches on databases
  • Monitored conditions
  • Triggering action following a confirmed alert
  • Be proactive with alerts
  • Practical work: executing a script when an attacker manages to connect to a server using Brute Force SSH

Training objectives

  • Be able to understand the Splunk User and Splunk Administrator concepts
  • Learn how to install Splunk
  • Be able to write simple search queries in the data
  • Know how to apply different data visualisation techniques using graphs and dashboards
  • Be able to implement Splunk to analyse and monitor systems
  • Understand how to write advanced data search queries
  • Configuring alerts and reports

Training prerequisites

  • Basic knowledge of networks and systems

Tarif

1320 €
Book Now

Important information:

Our courses are not registered with the Répertoire National des Certifications Professionnelles (RNCP), but they do comply with the requirements of the Répertoire Spécifique (RS).

Réserver l’événement

icône Form/calendar icon
icône Form/ticket icon
1 personne
1320
icône Form/up small icon icône Form/down small icon
Billets disponibles: Illimité
Le billet de "1 personne" est épuisé. Vous pouvez essayer un autre billet ou une autre date.

We use cookies to improve your experience. See our Cookie policy and our Privacy policy.

Information request

I would like more information about your training courses

ACG Cyberacademy collects and uses the data provided via this form in order to process your registration requests. Fields marked with an * are required. The other information enables us to optimise the follow-up of your request and the quality of our customer relations.