Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

Threat Hunting With Data Science And Splunk For Beginners

Posted By: ELK1nG
Threat Hunting With Data Science And Splunk For Beginners

Threat Hunting With Data Science And Splunk For Beginners
Published 5/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 4.74 GB | Duration: 1h 27m

Cybersecurity Analysis and Threat Hunting in SOC using Data Science and Splunk

What you'll learn

Data Science Fundamentals for Cybersecurity

Cybersecurity Threat Detection Techniques

Hunting 0-Day Attacks

Anomaly Detection with Splunk and MLTK app

Requirements

Basic Knowledge of Network and Cybersecurity

Basic Knowledge of Splunk

Basic Knowledge of Splunk Search Processing Language (SPL)

Description

Welcome to "Threat Hunting with Data Science and Splunk for Beginners," course where we dive into the exciting realm of cybersecurity and equip you with the foundational skills needed to detect and mitigate cyber threats using Splunk and Data Science. Throughout this course, we'll focus on the seamless integration of data science techniques with Splunk, empowering you to become a proficient cyber defender.In today's digital landscape, cyber threats are evolving rapidly, posing significant risks to organizations and individuals alike. That's why proactive threat detection is paramount, and this course is your gateway to mastering the art of threat hunting using basics of data science methodologies within the Splunk environment.We'll start by laying the groundwork with an introduction to Splunk and its capabilities in threat detection. You'll learn how Splunk serves as a central hub for ingesting, analyzing, and visualizing vast amounts of security data, enabling organizations to identify and respond to threats in real-time.Next, we'll delve into the world of data science and its integration with Splunk. You'll discover how data science techniques such as statistical analysis, machine learning, and natural language processing can augment Splunk's capabilities, allowing for deeper insights and more accurate threat detection.Throughout the course, we'll explore practical use cases where data science intersects with Splunk to enhance threat detection efficacy. From identifying anomalous user access patterns to detecting suspicious network traffic and uncovering malware activities, you'll gain hands-on experience in leveraging data science techniques within the Splunk environment to proactively hunt down cyber threats.But we won't stop there. We'll also delve into Splunk's Machine Learning Toolkit (MLTK), a powerful suite of tools that enables you to build and deploy custom machine learning models for threat detection. You'll learn how to harness the MLTK's capabilities to create predictive models that can automatically identify and mitigate emerging threats.By the end of this course, you'll emerge with a comprehensive understanding of how data science and Splunk intertwine to form a formidable defense against cyber threats. Whether you're new to cybersecurity or looking to deepen your expertise, "Threat Hunting with Data Science and Splunk for Beginners" will empower you to take your threat detection skills to the next level and make a meaningful impact in securing digital assets.

Overview

Section 1: Introduction

Lecture 1 Introduction

Section 2: Threat Hunting Lab Setup

Lecture 2 Splunk Installation

Lecture 3 Splunk bulk Apps and Addons Installation

Lecture 4 Splunk Boss of The SOC (BOTS) Installation

Lecture 5 Import Lab Attacks Data to Splunk

Section 3: Data Science and Splunk

Lecture 6 Data Science and Splunk

Section 4: Math and Statistics for Splunk

Lecture 7 Standard Deviation

Lecture 8 Normal Distribution or Gaussian Distribution

Lecture 9 Empirical or 68–95–99.7 rule

Lecture 10 Standard Normal Distribution (Z-Score)

Section 5: Anomaly Detection with Data Science and Splunk

Lecture 11 User Access Anomalies Hunting

Lecture 12 ICMP Tunnel Outlier Detection

Lecture 13 SMB Traffic Anomaly Detection

Lecture 14 Windows Process CommandLine Outlier Detection

Lecture 15 Detecting Log Disruption Attacks

Lecture 16 Network Traffic Volume Outliers Detection

Lecture 17 Malware Activity Detection by Math

Lecture 18 Let Splunk Detect Attacks for You

Lecture 19 Malware Detection with Shannon Entropy

Section 6: Splunk Machine Learning Toolkit (MLTK)

Lecture 20 What is Splunk Machine Learning Toolkit

Lecture 21 Splunk MLTK App Installation

Lecture 22 DNS Outlier Detection with MLTK

Section 7: Fault Tolerance for Data Science

Lecture 23 Increase Fault Tolerance for Data Science with Splunk

Section 8: Domain Generation Algorithm (DGA) Hunting with Splunk

Lecture 24 What is Domain Generation Algorithm (DGA)?

Lecture 25 Splunk DGA App Installation

Lecture 26 DGA Detection with splunk

Section 9: NLP Text Analytics

Lecture 27 NLP Text Analytics using Splunk

Security Operations Center (SOC) analysts,Cybersecurity Threat Hunters,Splunk Engineers,Threat Intelligence Analysts,DFIRs