Skip to main content

Splunk Training + Certification

Using Splunk Enterprise Security

Course Description

This 13.5-hour course prepares security practitioners to use Splunk Enterprise Security (ES). Students identify and track incidents, analyze security risks, use predictive analytics, and discover threat.

Instructor-led Training Schedule

Prerequisite Knowledge

To be successful, students should have a solid understanding of the following courses:

  • What is Splunk?
  • Intro to Splunk
  • Using Fields
  • Visualizations
  • Search Under the Hood
  • Introduction to Knowledge Objects
  • Introduction to Dashboards  
Or prior completion of the following legacy courses: 
  • Fundamentals 1
  • Fundamentals 2

Course Topics

  • ES concepts, features, and capabilities
  • Assets and identities
  • Security monitoring and Incident investigation
  • Use risk-based alerting and risk analysis▪ Use risk-based alerting and risk analysis
  • Use investigation workbench, timelines, list and summary tools
  • Detecting known types of threats
  • Monitoring for new types of threats
  • Using analytical tools
  • Analyze user behavior for insider threats
  • Use threat intelligence tools
  • Use protocol intelligence and live stream data

Course Objectives

Module 1 - Getting Started with ES
  • Describe the features and capabilities of Splunk Enterprise Security (ES)
  • Explain how ES helps security practioners prevent, detect, and respond to threats
  • Describe correlation searches, data models and notable events
  • Describe user roles in ES
  • Log into Splunk Web and access Splunk for Enterprise Security


Module 2 - Security Monitoring and Incident Investigation
  • Use the Security Posture dashboard to monitor ES status
  • Use the Incident Review dashboard to investigate notable events
  • Take ownership of an incident and move it through the investigation workflow
  • Use adaptive response actions during incident investigation
  • Create notable events
  • Suppress notable events


Module 3 –  Risk-Based Alerting
  • Give an overview of Risk-Based Alerting
  • View Risk Notables and risk information on the Incident Review dashboard
  • Explain risk scores and how to change an object's risk score 
  • Review the Risk Analysis dashboard
  • Describe annotations
  • Describe the process for retrieving LDAP data for an asset or indentify lookup


Module 4 – Investigations
  • Use investigations to manage incident response activity
  • Use the investigation Workbench to manage, visualize and coordinate incident investigations
  • Add various items to investigations (notes, action history, collaborators, events, assets, identities, files and URLs)
  • Use investigation timelines, lists and summaries to document and review breach analysis and mitigation efforts
Module 5 – Using Security Domain Dashboard
  • Use ES to inspect events containing information relevant to active or past incident investigation
  • Identify security domains in ES
  • Use ES security domain dashboards
  • Launch security domain dashboards from incident Review and from action menus in search results
Module 6 – Web Intelligence
  • Use the web intelligence dashboards to analyze your network environment
  • Filter ad highlight events
Module 7 – User Intelligence
  • Evaluate the level of insider threat with the user activity and access anomaly dashboards
  • Understand asset and identity concepts
  • Use the Asset and identify Investigator to analyze events 
  • Use the session center for identity resolution
  • Discuss Splunk User Behavior Analytics (UBA) integration 
Module 8 – Threat Intelligence
  • Give an overview of the Threat Intelligence framework abd how threat intel is configured in ES
  • Use the Threat Activity dashboard to see which threat sources are interacting with your environment
  • Use the Threat Artifacts dashboard to examine the status of threat intelligence information in your environment
Module 9 - Protocol Intelligence
  • Explain how network data is input into Splunk events
  • Describe Stream events 
  • Give an overview of the Protocol intelligence dashboards and how they can be used to analyze network data