FaresMorcy
CtrlK
  • Whoami
  • Footprinting Labs
  • Shells & Payloads
  • Password Attacks
  • Active Directory Enumeration & Attacks
  • SOC Hackthebox Notes & Labs
    • Security Monitoring & SIEM Fundamentals Module
    • Windows Event Logs & Finding Evil Module
    • Introduction to Threat Hunting & Hunting With Elastic Module
    • Understanding Log Sources & Investigating with Splunk Module
      • Introduction To Splunk & SPL
      • Using Splunk Applications
      • Intrusion Detection With Splunk (Real-world Scenario)
      • Detecting Attacker Behavior With Splunk Based On TTPs
      • Detecting Attacker Behavior With Splunk Based On Analytics
      • Skills Assessment
    • Windows Attacks & Defense
    • Intro to Network Traffic Analysis Module
    • YARA & Sigma for SOC Analysts Module
  • Malicious Document Analysis - HTB Notes
  • Build Home Lab - SOC Automation
  • Home Lab (Attack & Defense Scenarios)
  • Home Lab (Active Directory Scenarios)
  • Build ELK Lab
  • CyberDefenders
  • TryHackme Rooms
  • Powershell Scripting Fundamentals
  • Practical Windows Forensics
  • Hackthebox Rooms
  • WEInnovate Training
  • TryHackme SOC 1
  • TryHackme SOC 2
Powered by GitBook
On this page
  1. SOC Hackthebox Notes & Labs

Understanding Log Sources & Investigating with Splunk Module

Introduction To Splunk & SPLUsing Splunk ApplicationsIntrusion Detection With Splunk (Real-world Scenario)Detecting Attacker Behavior With Splunk Based On TTPsDetecting Attacker Behavior With Splunk Based On AnalyticsSkills Assessment
PreviousIntroduction to Threat Hunting & Hunting With Elastic ModuleNextIntroduction To Splunk & SPL

Last updated 1 year ago