Bata Mladen
Ctrlk
HomeNotesWrite-Up'sBookshelfArticles
  • Intro
  • ⚙️SERVICES
    • DNS
    • Oracle TNS
    • FTP
    • SMB
    • Routing Protocols
    • MariaDB/MySQL
  • 👨‍💻PROGRAMMING
    • Java
    • Python
    • Assembly
  • 🔐CRYPTOGRAPHY
    • Cryptography Intro
    • Encryption Algorithm
    • Hash Functions
    • Digital Signatures
  • 🛡️SECURITY CONCEPTS
    • Security Basics
    • Threads and Vulnerabilities
    • Network Security
    • Certificates
  • 👓PRIVACY
    • Password Manager
    • Drive
    • Browser
    • VPN
    • Messengers
    • Temporary Mails
    • Online Payments
    • Deleting Files
  • 🔍DIGITAL FORENSICS
    • Introduction
    • Digital Forensics Investigation Process
    • Computer Forensic Fundamentals
    • Investigation Process
    • Incident Response
    • Data Acquisition & Evidence Collection
    • Email Investigation
    • Dark Web Forensic
    • Defeating Anti-Forensic Techniques
    • OSINT
  • 📜CERTIFICATES
    • CPTS
    • CDSA
      • Module 1 - Incident Handling
      • Module 2 - Security Monitoring & SIEM Fundamentals
      • Module 3 - Windows Events & Finding Evil
      • Module 4 - Threat Hunting
      • Module 5 - Understanding Log Sources and Investigating With Splunk
        • Introduction to Splunk
        • Introduction to Splunk Apps
        • Intrustion Detection with Splunk
        • Detecting Attacker Behavior With Splunk Based On TTPs
        • Detecting Attacker Behavior With Splunk Based On Analytics
      • Module 6 - Active Directory
  • 🤖MACHINE LEARNING
    • Learning Algorythm Types
    • Data Exploration
    • Data Pre-Processing
    • Training & Testing Data
    • Feature engineering
    • ML techniques
    • Anomaly Detection
    • Classification Raport
  • 🐧LINUX
    • Basic Linux Commands
    • SQL
    • Managing Users & Groups
  • 💻COMPUTER CONCEPTS
    • File Systems
    • Metadata
    • ISA
  • ⚙️Reverse Engineering
    • Intro
  • 🦠Malware Analysis
    • Soon..
Powered by GitBook
On this page
  1. 📜CERTIFICATES
  2. CDSA

Module 5 - Understanding Log Sources and Investigating With Splunk

Introduction to SplunkIntroduction to Splunk AppsIntrustion Detection with SplunkDetecting Attacker Behavior With Splunk Based On TTPsDetecting Attacker Behavior With Splunk Based On Analytics
PreviousElastic CodesNextIntroduction to Splunk