👇 CELEBRATE CLOUD SECURITY DAY 👇
00
HOURS
00
MINUTES
00
SECONDS
The Splunk Enterprise Security Certified Admin (SPLK-3001) certification is designed for professionals who manage and configure the Splunk Enterprise Security (ES) application, enabling them to leverage Splunk’s capabilities for security information and event management (SIEM). This certification validates the skills needed to implement, configure, and manage Splunk ES, focusing on threat detection, incident response, and the overall security posture of an organization. Candidates will demonstrate proficiency in using Splunk ES to analyze security data, configure alerts, and create dashboards to monitor security incidents effectively.
Why is Splunk Enterprise Security Certified Admin (SPLK-3001) important?
Who should take the Splunk Enterprise Security Certified Admin (SPLK-3001) Exam?
Skills Evaluated
Candidates taking the certification exam on the Splunk Enterprise Security Certified Admin (SPLK-3001) is evaluated for the following skills:
Splunk Enterprise Security Certified Admin (SPLK-3001) Certification Course Outline
The Splunk Enterprise Security Certified Admin (SPLK-3001) Certification covers the following topics -
1. Understanding ES Introduction 5%
1.1 Overview of ES features and concepts
2. Understanding Monitoring and Investigation 10%
2.1 Security posture
2.2 Incident review
2.3 Notable events management
2.4 Investigations
3. Understanding Security Intelligence 5%
3.1 Overview of security intel tools
4. Understanding Forensics, Glass Tables, and Navigation Control 10%
4.1 Explore forensics dashboards
4.2 Examine glass tables
4.3 Configure navigation and dashboard permissions
5. Understanding ES Deployment 10%
5.1 Identify deployment topologies
5.2 Examine the deployment checklist
5.3 Understand indexing strategy for ES
5.4 Understand ES Data Models
6. Understanding Installation and Configuration 15%
6.1 Prepare a Splunk environment for installation
6.2 Download and install ES on a search head
6.3 Understand ES Splunk user accounts and roles
6.4 Post-install configuration tasks
7. Understanding Validating ES Data 10%
7.1 Plan ES inputs
7.2 Configure technology add-ons
8. Understanding Custom Add-ons 5%
8.1 Design a new add-on for custom data
8.2 Use the Add-on Builder to build a new add-on
9. Understanding Tuning Correlation Searches 10%
9.1 Configure correlation search scheduling and sensitivity
9.2 Tune ES correlation searches
10. Understanding Creating Correlation Searches 10%
10.1 Create a custom correlation search
10.2 Configuring adaptive responses
10.3 Search export/import
11. Understanding Lookups and Identity Management 5%
11.1 Identify ES-specific lookups
11.2 Understand and configure lookup lists
12. Understanding Threat Intelligence Framework 5%
12.1 Understand and configure threat intelligence
12.2 Configure user activity analysis
(Based on 821 reviews)
No reviews yet. Be the first to review!