Monitoring and Detection: Splunk
In this lab, you’ll practice searching through data using Splunk to monitor a web application and detect potential malicious activity. When you’re finished, you’ll have the ability to use Splunk for monitoring and detection of threats on your network.
Terms and conditions apply.
Lab info
Lab author
Challenge
Get Started in the Lab Environment
Here are the initial instructions and explanation of the lab environment. Read this while your environment is busy creating itself from nothing. Yes, this violates physics; we know. How fun!
Challenge
How to Upload Data to Splunk
This challenge will teach learners how they can upload data to Splunk for analysis.
Challenge
How to Perform Searches in Splunk
In this challenge, you will focus on how to perform searches on data within Splunk.
Challenge
How to Create and Share Reports in Splunk
In this challenge you will learn how to create reports to summarize and share information on your findings in Splunk.
Challenge
How to Create Dashboards in Splunk
In this challenge you will learn how to create dashboards in Splunk for continuous monitoring.
Challenge
The Last Challenge
Welcome to the final challenge! This is your last chance to experiment in the environment. Clicking Finish Lab will end this little world that flittered into existence just for you.
Provided environment for hands-on practice
We will provide the credentials and environment necessary for you to practice right within your browser.
Guided walkthrough
Follow along with the author’s guided walkthrough and build something new in your provided environment!
Did you know?
On average, you retain 75% more of your learning if you get time for practice.
Recommended prerequisites
- Basic understanding of cybersecurity
- Basic understanding of logging