All new Advanced Threat Hunting with Splunk

When it comes to log analysis, Splunk is one the most popular enterprise-grade solutions in the field today. Also, it can pull logs from nearly any device in the network, and it can integrate with most of the popular security products on the market. Today, Splunk is a common tool for Cyber Threat Hunting/Hunt Teaming/Malware Hunting/Defensive Cyber Operations (DCO)/Cyber Threat Analysis and many other names.

As popular as Splunk is – surprisingly few people are comfortable performing security event analysis with it. We decided to develop a Hands-on Splunk course designed specifically for InfoSec Professionals who want to do HANDS-ON DEEP TECHNICAL SECURITY ANALYSIS with Splunk.

The course price is $200, but the first 5 signups get it for $100 – so signup now!

Class Syllabus

Module 1: Deploying Splunk, configuring logging and forwarding

  • Installing Splunk
  • Configuring logging in Windows and Linux
  • Setting up log forwarding
  • Understanding how Windows Event logging works

The course price is $200, but the first 5 signups get it for $100 – so signup now!

Module 2: Attacking Servers and Workstations

  • Learning attacker tools/tactics/procedures (TTPs)
  • Generating real world security events to analyze
  • Attacking Workstations
  • Attacking Application Servers
  • Learning what types of security events generate log events
  • Writing basic queries for common attacks
  • Analyzing PCAP files with Splunk

Module 3: Hunting with Splunk

  • Data-Centric vs End-Point Hunting
  • Understanding IOCs/IOAs
  • Indicators of Compromise (IOCs)
  • Indicators of Attack (IOAs)
  • Integrating data from popular security products
  • Writing complex queries
  • Detecting Zero-Day attacks

The course price is $200, but the first 5 signups get it for $100 – so signup now!

Who is this class for?

IT System Administrators, IT Security Professionals, SOC Analysts, First Responders, Incident Handlers, Intrusion Analysts, and also Malware Analysts.

Class pre-requisites

Students should be familiar with using Windows and Linux operating environments. They also should be able to troubleshoot general connectivity and setup issues.

They should be familiar with VMware Workstation and be able to create and configure virtual machines.

Students are recommended to have a high-level understanding of key programming concepts, such as variables, loops, and functions. However, no programming experience is necessary.

Students will be provided with detailed courseware, detailed lab manuals, and copy/paste notes. So,  even if the student is not very strong, technically they will be able to complete the lab exercises and take notes effectively.

Class Schedule & Delivery Method

This class is a completely self-paced course that will go live on Monday the 13th of August at midnight. You can access the course by clicking on the “My Courses” link in the top right corner of

Students will receive

  • 24 hours of CPEs
  • Several virtual machines
  • Courseware slides
  • Lab manual

Videos are in the actual course module lessons in the InfoSec Addicts website.


Students can request help via the support chat system in the site or via the email based trouble ticketing system (allow 24 hours for a response). Send all questions/concerns to [email protected]


The course price is $200, but the first 5 signups get it for $100 – so signup now!

Try Certified Ethical Hacker for FREE!!!

Join the infosec family! Your journey starts here. The free tier gives you limited access to our training materials.
Regular use
This is the second tier that includes limited access to our training materials and to our exclusive lab.  
Risky use
This third tier gives you all the luxuries of the Free use and more. You have access to self-paced classes.  
Monthly use
This last tier gives you the Free, Social and Problem use for just $89 a month. Plus you will save $29!!!  

This post was written by Joseph McCray

3 thoughts on “All new Advanced Threat Hunting with Splunk

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.