Table of Contents
1. Introduction to Splunk and Cybersecurity
2. Overview of Splunk Architecture
3. Configuring Inputs and Data Sources
4. Data Ingestion and Normalization
5. Understanding SIEM
6. Splunk Enterprise Security
7. Security Intelligence
8. Forensic Investigation in Security Domains
9. Splunk Integration with Other Security Tools
10. Splunk for Compliance and Regulatory Requirements
11. Security Orchestration, Automation and Response (SOAR) with Splunk
12. Cloud Security with Splunk
13. DevOps and Security Operations
14. Best Practices for Splunk in Cybersecurity
15. Conclusion and Summary
2. Overview of Splunk Architecture
3. Configuring Inputs and Data Sources
4. Data Ingestion and Normalization
5. Understanding SIEM
6. Splunk Enterprise Security
7. Security Intelligence
8. Forensic Investigation in Security Domains
9. Splunk Integration with Other Security Tools
10. Splunk for Compliance and Regulatory Requirements
11. Security Orchestration, Automation and Response (SOAR) with Splunk
12. Cloud Security with Splunk
13. DevOps and Security Operations
14. Best Practices for Splunk in Cybersecurity
15. Conclusion and Summary
Index