Splunk Security Event Monitoring – Blue Team Series with Hackersploit
Continuing our Blue Team series, @HackerSploit covers event monitoring and much more with @Splunk. Splunk is the first data-to-everything platform powered by artificial intelligence, advanced data search, and optimized data streaming. Splunk is trusted by hundreds of thousands of users, including 91 of the Fortune 100 companies to advance data security and automation..
1:19 What We Will Be Covering
4:00 Introduction to Splunk
7:44 What is Splunk?
8:48 Splunk Learning Resources
9:13 About Our Lab Environment
10:56 Beginning the Practical Demo
11:16 How to Setup Splunk
17:32 How to Access Splunk
18:09 How to Configure Splunk
22:59 How to Install the Splunk Forwarder
23:19 How to Initialize Splunk
25:27 How to Add the Forward Server
30:79 How to Read the Logs
32:30 How to Forward the Log Files
34:00 Configure inputs.conf
36:30 Verify Data is Being Forwarded
37:24 How to Make Use of the Log Data
40:27 Exploring the Splunk Dashboard
47:44 Customizing Your Dashboards
New to Linode? Get started here with a $100 credit.
Read the doc for more information on monitoring your Linode account with Splunk.
Learn more about Splunk in the Linode Marketplace.
Subscribe to get notified of new episodes as they come out.
#Linode #Splunk #BlueTeam #CyberSecurity
Product: Linode, Splunk, Cyber Security; @HackerSploit ;
Intrusion Detection with Suricata – Blue Team Series with Hackersploit
You might also like…
Network Traffic Analysis with Wireshark – Blue Team Series with HackersploitThis series will cover Blue Team techniques and tools used by security analysts and SOC teams, such as Wireshark.
What Is Linode Doing To Strengthen Cybersecurity Of Its UsersIn this video featuring Alexis from Hackersploit, learn what Linode is doing to strengthen cybersecurity on the web.
Linux Privilege Escalation Techniques | Red Team Series 9-13In this video in our Hackersploit Red Team Series, we will cover Linux privilege escalation techniques.
Brute Force Protection | Linux Security with HackerSploitIn part 2 of the Linux Security series, HackerSploit shows how to set up fail2ban on a server to prevent brute force SSH attacks.