Tags
Language
Tags
August 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 31 1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30
31 1 2 3 4 5 6
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Practical Security Investigation With Splunk, Wazuh, Osquery

    Posted By: ELK1nG
    Practical Security Investigation With Splunk, Wazuh, Osquery

    Practical Security Investigation With Splunk, Wazuh, Osquery
    Published 8/2025
    MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
    Language: English | Size: 1.89 GB | Duration: 3h 50m

    Master SOC fundamentals, incident response, log analysis, and threat detection with Splunk, Wazuh and OSquery labs,

    What you'll learn

    Fundamentals of SOC and Role of an SOC analyst

    Fundamentals of SIEM

    Hands-on with Splunk and conduct security investigation

    How to use Wazuh for alerts and vulnerability detection

    How to hunt endpoints with Osquery for deep forensics

    Requirements

    Basics of Computers

    Basic knowledge IT Network Protocols

    Description

    Welcome to the SOC Analyst Masterclass: Security Investigation with Splunk, Wazuh, and Osquery!This course is designed to give you the skills and confidence to investigate, detect, and respond to real-world security incidents using leading open-source and enterprise SOC tools. Whether you’re starting your SOC career or looking to enhance your security investigation skills, this hands-on, step-by-step program will guide you through the complete process of setting up a virtual SOC lab, understanding different log types, and mastering investigation techniques.This is a practical, Learn-by-Doing course — you’ll not only understand the theory but also build your own SOC lab, work with real logs, and replicate real-world investigation scenarios. You’ll get detailed demonstrations, guided exercises, and ready-to-use commands for Splunk, Wazuh, and Osquery so you can follow along at your own pace.In this course, you will cover:SOC & SIEM Fundamentals: Understand SOC roles, functions, tools, and processes. Learn core SIEM concepts and how they fit into security monitoring.Log Types & Data Sources: Explore Windows (Event Logs, Sysmon), Linux (Syslog, Auth), and network logs (Firewall, DNS, HTTP) to understand their value in threat detection.Lab Setup & Tools Installation: Build your own SOC lab from scratch, including Splunk, Wazuh Manager, Kali Linux, and supporting infrastructure using VMware or VirtualBox.Security Investigations with Splunk: Perform hands-on analysis with SPL commands to investigate brute force attacks, DNS beaconing, suspicious file transfers, compromised accounts, and unauthorized cloud access.Threat Detection with Wazuh: Investigate file modifications, brute force activity, vulnerabilities, and learn how Wazuh rules trigger alerts.Endpoint Forensics with Osquery: Run live queries to collect endpoint data, investigate anomalies, and support incident response efforts.By the end of this course, you will have the ability to:Confidently investigate security incidents using Splunk, Wazuh, and OsqueryUnderstand how to analyze logs from multiple sources for accurate threat detectionBuild and manage your own virtual SOC lab for continuous practiceApply your skills to real-world SOC scenarios and improve your incident response capabilitiesWho this course is for:Aspiring SOC analysts, blue team members, and cybersecurity enthusiastsIT professionals looking to transition into security operationsAnyone who wants practical, hands-on SOC investigation experience with industry toolsGet ready to take your security investigation skills to the next level — I’ll see you in the course!

    Overview

    Section 1: Introduction to SOC and SIEM

    Lecture 1 What is a SOC

    Lecture 2 Role of a SOC Analyst

    Lecture 3 Overview of SOC Tools and Technologies

    Lecture 4 Understanding SIEM

    Section 2: Understanding Log Types and Data Sources

    Lecture 5 What is Log and Log analysis

    Lecture 6 Windows Logs

    Lecture 7 Linux Logs

    Lecture 8 Network Logs

    Section 3: Installing and Setting Up Lab

    Lecture 9 Lab Requirements: Hardware and Software

    Lecture 10 Setting up a Linux Server on VMWARE Workstation

    Lecture 11 Setting up Virtual Machines- Virtualbox

    Lecture 12 Setting up a Linux Server on Virtualbox

    Lecture 13 Installing Splunk

    Lecture 14 Installing Wazuh Manager

    Lecture 15 Setting up Attacker Machine(Kali Linux)

    Section 4: Security Investigation with Splunk

    Lecture 16 What is SIEM?

    Lecture 17 Introduction to Splunk

    Lecture 18 Demo: Splunk Dashboard

    Lecture 19 Splunk for SOC Analyst

    Lecture 20 Exploring Fields in Splunk Search

    Lecture 21 head command

    Lecture 22 stats command

    Lecture 23 table command

    Lecture 24 timechart command

    Lecture 25 dedup command

    Lecture 26 Investigating SSH brute force using Splunk

    Lecture 27 DNS Beaconing Detection Using Splunk

    Lecture 28 Detect Suspicious File Transfer via Splunk

    Lecture 29 Investigate Compromised Windows User Account using Splunk

    Lecture 30 Unauthorized Cloud Access AWS from a Foreign Country

    Section 5: Section 5: Security Investigation with Wazuh

    Lecture 31 Introduction to Wazuh

    Lecture 32 Wazuh Demo

    Lecture 33 Wazuh Rules

    Lecture 34 Investigating Unauthorized File Modification using Wazuh

    Lecture 35 Investigating SSH brute force using Wazuh

    Lecture 36 Vulnerability detection with Wazuh

    Section 6: Security Investigation with Osquery

    Lecture 37 Introduction to Osquery

    Lecture 38 Installing Osquery

    Lecture 39 Lab 1: List All Installed Software on Linux

    Lecture 40 Lab 2: Detect New User Accounts Created

    Lecture 41 Lab 3: Detect Malware Making Outbound Connections

    Section 7: More Resources for Security Investigation

    Lecture 42 More Sample Log File for Security Investigation on Splunk

    IT or Network Engineer,Freshers,SOC analyst,Network Security Engineer,System Administrator