Want more details on Splunk Education Programs?

This path prepares security practitioners to use Splunk Enterprise Security (ES). Students will use ES to identify and track security incidents, analyze security risks, use predictive analytics, and threat discovery.

Notice: The following courses; Using SplunkSearching and Reporting with Splunk, Creating Splunk Knowledge Objects, Splunk Infastructure Overview are now replaced with Splunk Fundamentals 1 and Splunk Fundamentals 2 (see new learning path below).

If you are a partner or have a subscription, you can continue to take the legacy classes and then take both the Certified User and Certified Power User exam.

  

Splunk Fundamentals 1

This self-paced course teaches you how to search and navigate in Splunk, use fields, get statics from your data, create reports, dashboards, lookups, and alerts. It will also introduce you to Splunk's datasets features and Pivot interface.

Splunk Fundamentals 2

This 4 virtual-day course focuses on additional SPL commands, using field aliases and calculated fields, creating tags and event types, using macros, creating workflow actions and data models, and normalizing data with the CIM. 

Splunk Fundamentals 3

This 4 virtual-day course focuses on additional search commands as well as on advanced use of knowledge objects. Major topics include advanced statistics and eval commands, advanced lookup topics, advanced alert actions, using regex and erex to extract fields, using spath to work with self-referencing data, creating nested macros and macros with event types, and accelerating reports and data models.

Advanced Searching and Reporting with Splunk

This 3 virtual day course takes the Splunk search language to the next level. Learn powerful advanced commands and lookup methods.

Using Splunk Enterprise Security

This 3 virtual day course prepares security practitioners to use Splunk Enterprise Security (ES). Students will use ES to identify and track security incidents, analyze security risks, use predictive analytics, and threat discovery.