and welcome to an introduction. This punks Final video. I hope you've enjoyed this course at this point, I need to introduce the assistant for this course page.
She's helped to make most of the supplemental materials. You probably want to keep an eye out for courses coming out by her
in module one. We learned about what *** is and how learning it can help your career. We talked about how Splunk is a high pain, prominent company and how its software and service is turn
machine data. In the answers, we found average salaries for *** administrators are very high
and that many companies want Splunk knowledge for a variety of positions, including that of I t leadership,
business analyst, security professionals, Web developers, et cetera.
In module to we talked about the many. Resource is Funk has available for learning, collaborating, referencing and participating in the community.
We explored some important features on the Splunk website. Like their training and documentation centers, we discuss certification paths and went over *** products. Besides Point core,
here's a quick overview of some popular spun products. We stole a trial version
of the Splunk Enterprise in this video,
*** enterprise is considered an option for course. Plunk platform alternatives includes bunk light, *** free and spoon cloud
***. Enterprise security isn't at placed on top of a splint platform. The hellspawn work more like a SIM.
It offers help correlating, organizing and prioritising events with the security focus.
Slink User Behavior Analytics helps detect anomalies in your events that can help identify risky user behavior, find compromises and perform other activities.
Phantom is an orchestration and automation tool that can take in events from many different sources and run playbooks to enact automated actions in response to different conditions.
Victor ops helped with alerting by Sunday notifications and tracking response times,
of course. Blink of other products as well, like their Splunk for industrial I ot insights for infrastructure and others
in Module three. We talked about the data pipeline, the different parts of long
and how to install ***, including
Universal Florida installations on Windows and Lennox.
The parts of *** we focused on were foreigners, indexers and search. It's.
There are other rules, such as deployment servers and license masters.
Foreigners in Next in search has corresponded parts of the data pipeline. Ah, universal forger generally just handles taking the input and passing it along to an index or deport index and supply when a search head runs a search
macho for covered. How using the ***. Web interface,
different ways to get data in this funk and how to monitor a file location by modifying the inputs Bone Configuration file.
We talked about how you can set *** toe listen on different ports to receive data, including data sent from forgers and sis like events. You can also directly upload data, monitor files and directories, perform a P I calls and more.
Module five was about working with data. We learned how to do simple searches, create alerts, reports and dashboards and how to install a nap.
We learned some good tips, such as how to make more specific events to prove
improve ***, performance as well, a setting alerts and reports to run at different times.
We also ran some example searches and talked about how you can check supplemental materials for more examples.
Module six. Our last module helps you prepare for the final test and future study.
I really hope you've enjoyed this cost, and I wish you the best of luck in your careers.