.
سرفصل ها
Splunk Fundamentals 1
- Module 1: Introducing Splunk
- Module 2: Searching
- Module 3: Using Fields in Searches
- Module 4: Creating Reports and Dashboards
- Module 5: Splunk’s Search Language
- Module 6: Transforming Commands
- Module 7: Creating and Using Lookups
- Module 8: Creating Scheduled Reports and Alerts
Splunk Fundamentals 2
- Module 1: Beyond Search Fundamentals
- Module 2: Using Transforming Commands for Visualization
- Module 3: Using Trendlines, Mapping, and Single Value Commands
- Module 4: Filtering Results and Manipulating Data
- Module 5: Correlating Events
- Module 6: Understanding Knowledge Objects
- Module 7: Creating and Managing Fields
- Module 8: Creating Field Aliases and Calculated Fields
- Module 9: Creating Tags and Event Types
- Module 10: Creating and Using Macros
- Module 11: Using the Common Information Model (CIM) Add-on
Splunk Enterprise System Administration
- Module 1: Splunk Deployment Overview
- Module 2: License Management
- Module 3: Splunk Apps
- Module 4: Splunk Configuration Files
- Module 5: Splunk Indexes
- Module 6: Splunk Index Management
- Module 7: Splunk User Management
- Module 8: Configuring Basic Forwarding
Splunk Enterprise Data Administration
- Module 1: Introducing Splunk Data Administration
- Module 2: Getting Data In – Staging
- Module 3: Forwarder Configuration
- Module 4: Heavy Forwarders & Forwarder Management
- Module 5: Monitor Inputs
- Module 6: Network and Scripted Inputs Module
- Module 7: Fine-tuning Inputs
- Module 8: Parsing Phase and Data Preview
- Module 9: Manipulating Raw Data
Using Splunk Enterprise Security
- Getting Started with Enterprise Security
- Security Monitoring and Incident Investigation
- Investigations
- Using Security Domain Dashboards
- Risk Analysis
- Web Intelligence
- User Intelligence
- Threat Intelligence
- Protocol Intelligence
Administering Splunk Enterprise Security
- Introduction to ES
- Security Monitoring
- Incident Investigation
- Analyst Tools & Dashboards
- ES On-prem Deployment
- Installation
- Initial Configuration
- Validating ES Data
- Tuning Correlation Searches
- Creating Correlation Searches
- Asset & Identity Management
- Threat Intelligence Framework
به عنوان اولین نفر، نظر خود را بنویسید!