Splunk 6 Knowledge Objects
0.5 (1 rating)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
47 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Splunk 6 Knowledge Objects to your Wishlist.

Add to Wishlist

Splunk 6 Knowledge Objects

Provides a deep understanding of what Splunk knowledge objects are and how they are used
0.5 (1 rating)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
47 students enrolled
Last updated 7/2016
English
Current price: $10 Original price: $80 Discount: 88% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 1 hour on-demand video
  • 1 Supplemental Resource
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Develop a deep understanding of what Splunk knowledge objects are and how they are used
  • Create and Manage Fields
  • Create and Manage Tags
  • Create and Manage Event Typre
  • Create and Manage Workflow Actions
  • Create and Manage Alerts
  • Create and Manage Macros
  • Create and Manage Data Models
View Curriculum
Requirements
  • Using Splunk
  • Splunk Searching & Reporting
  • What is Splunk
Description

Course: Splunk 6 Knowledge Objects 

Benefits : This course focuses on working with Splunk's Knowledge Objects including Fields, Events, Tags, Macros, Data Models, Workflow Actions and Alerts

Delivery: Online

Agenda : This course prepares System & Security administrators to configure and manage Splunk Knowledge Objects. Topics include Creating and Managing Fields, Event Types, Tags, Macros, Data Models, Workflow Actions and Alerts.

Lab Access & Lab Guide : Not Included

Who is the target audience?
  • Data Analysts
  • Data Scientists
  • System Administrators
  • Security Administrator
  • System Engineers
  • Security Consultants
  • System Analysts
  • Security Analysts
Compare to Other Splunk Courses
Curriculum For This Course
+
Course Introduction
1 Lecture 02:11

Course Introduction, Description, Target Audience, Benefits, Contents and Outcomes

Preview 02:11
+
Course Contents
8 Lectures 45:04

Review permissions

Define naming conventions

Create and use field aliases

Create calculated fields

Preview 09:32

Perform field extractions

Field Extractions Manager

Interactive Field Extractor (IFX)

Rename Sourcetypes

Preview 02:10

Creating Tags

Creating Event types

Preview 05:01

Create a GET workflow action

Create a POST workflow action

Create a Search workflow action

Use special parameters with workflow actions

Preview 09:12

Describe alerts

Create alerts

Run the underlying search

Set the schedule, conditions, and actions

View fired alerts

Creating and Managing Alerts
05:09

Describe macros

Manage macros

Create a basic macro

Use a basic macro

Define arguments / variables for a macro

Add and use arguments with a macro

Creating and Using Macro
05:09

Describe the relationship between data models and Pivot

Identify data model objects

Identify object attributes

Identifying Data Model Objects
03:06

Create a data model

Accelerate a data model

Use a data model in Pivot

Creating Data Models along with Sample Data Set for Lab Exercises .
05:45
About the Instructor
Security Skills Hub
3.3 Average rating
239 Reviews
5,878 Students
23 Courses
Information Security Training

Information Security organization focusing on enabling skills and competency in the domain of Information Security across multiple practices including Governance, Risk Management, Compliance Management, Identity and Access Management, data Security, Application Security, SAP Security, Managed Security Services, Infrastructure Security and Device Management.

Our mission and vision is to bring hands on training on training in the domain of Information Security tools and technologies to every individual wanting to make a career in this domain by making it more affordable, self intuitive and tailored to the skills required.