Thank God!!! Proper videos on cyber security based around the Splunk SIEM!!! You've made my job SO much easier. Even the official Splunk tutorials are generic for different data ingests. You're an absolute legend mate thank you!
Brother, great video here today. Please do not stop. It is incredibly overwhelming transitioning form easily setting up and having data to work with to actually doing SOC analyst like work in real world like case scenarios. This is that first step that has showcased how direct and easy it is to navigate such data. Thanks for this video.
Hello, I have prepared and created a video on Splunk(SIEM tool) where I explained basics about Splunk and what is the use of it. If you have learned somthing from it the kindly comment. Thanks. th-cam.com/video/ddVmKjQYSSU/w-d-xo.htmlsi=8HgQMvHkOTxSjtQV
Hi, thanks for sharing this video. If you don't mind, could you please number all the videos in the playlist in the order you would advise us to watch?
Hi I just found a goldmine of a resource on splunk and its workability. But can you recommend me one of your playlist for a soc analyst role starter. Subbed!
hi. can u please help me.when I click on start machine it starts the timer but the machine doesn't load. no Split View or anything like that. Do we have to do anything with the machineIP?
hi. can u please help me.when I click on start machine it starts the timer but the machine doesn't load. no Split View or anything like that. Do we have to do anything with the machineIP?
Why did you list the sequence process as: Indexer, Forwarder and Search, however your presentation started with a discussion on Forwarder, not Indexer. Please coordinate presentation with order displayed. Thank you.
hi. can u please help me.when I click on start machine it starts the timer but the machine doesn't load. no Split View or anything like that. Do we have to do anything with the machineIP?
@@MotasemHamdan I'm also interested in the notes, to give a booster in my own notes. Unfortunately I can't find much information about them. I read it's over 300 pdf pages that we have online access. But is it also possible to download them?
Hello, I have prepared and created a video on Splunk(SIEM tool) where I explained basics about Splunk and what is the use of it. If you have learned somthing from it the kindly comment. Thanks. th-cam.com/video/ddVmKjQYSSU/w-d-xo.htmlsi=8HgQMvHkOTxSjtQV
I'm new to Cybersecurity but have Systems Administration background and I appreciate you for pointing this out. I asked Bard if Splunk can do more than SIEM. Below is the response Splunk can also be used for: Security analytics: Splunk can be used to analyze security data to identify threats and vulnerabilities. It can also be used to investigate security incidents and to track the progress of remediation efforts. Compliance reporting: Splunk can be used to generate reports that demonstrate compliance with industry regulations. This can help organizations to avoid fines and penalties. DevOps monitoring: Splunk can be used to monitor the performance of applications and infrastructure. This can help to identify and resolve problems before they impact users. Business intelligence: Splunk can be used to collect and analyze data from a variety of sources to gain insights into business operations. This can help organizations to make better decisions and to improve their bottom line.
Thank God!!! Proper videos on cyber security based around the Splunk SIEM!!! You've made my job SO much easier. Even the official Splunk tutorials are generic for different data ingests. You're an absolute legend mate thank you!
Thank God!!! Proper videos on cyber security based around the Splunk SIEM!!!
You've made my job SO much easier. Even the official Splunk tutorials are generic for different data ingests.
You're an absolute legend mate thank you!
Brother, great video here today. Please do not stop.
It is incredibly overwhelming transitioning form easily setting up and having data to work with to actually doing SOC analyst like work in real world like case scenarios. This is that first step that has showcased how direct and easy it is to navigate such data.
Thanks for this video.
Just found you channel today when I got stuck in this room. Loving your content. Thanks a bunch for sharing such content. You got a new subscriber!!!
Absolutely love this, thank you for doing this, you are a true blessing!
Finally splunk videos that I can understand!
Dude I really like your content. Please keep on making!
Thanks alot for this wonderful effort !
This is awesome for those of us new to cyber security! Thanks for making the video, and please continue to do so!
Hello,
I have prepared and created a video on Splunk(SIEM tool) where I explained basics about Splunk and what is the use of it. If you have learned somthing from it the kindly comment.
Thanks.
th-cam.com/video/ddVmKjQYSSU/w-d-xo.htmlsi=8HgQMvHkOTxSjtQV
An excellent video, thank you for all the explanations.
Is the Cyber Security Manual private or is it public and accessible to everyone?
Amazing video, Please could you provide the dataset you used in the video so that we can follow alongside with you. Thank you!
Hi, thanks for sharing this video. If you don't mind, could you please number all the videos in the playlist in the order you would advise us to watch?
Really good introduction! Nice work :)
I just love that organized onenote :)
How can I get the onenote please let me know!!
Hi I just found a goldmine of a resource on splunk and its workability. But can you recommend me one of your playlist for a soc analyst role starter. Subbed!
hi. can u please help me.when I click on start machine it starts the timer but the machine doesn't load. no Split View or anything like that. Do we have to do anything with the machineIP?
جزاك الله كل خير
Wonderful explnanation brother. Can you share Notes please they perfect fpr beginner to practice ?? thanks
I also like your content keep it up
hi. can u please help me.when I click on start machine it starts the timer but the machine doesn't load. no Split View or anything like that. Do we have to do anything with the machineIP?
Assalamualaikum Habibi.
Jazakumullaho Kayeran
Why did you list the sequence process as: Indexer, Forwarder and Search, however your presentation started with a discussion on Forwarder, not Indexer. Please coordinate presentation with order displayed. Thank you.
Thanks for your effort, just wondering if u planning to do Osquery: The Basics room?
Thank you so much
Thank you for this training. The TryHackMe's splunk room isn't really for beginner.
I want to have the full tutorial of splunk and SOC. Please let me know how to enroll.
Keep going BRO 🎉🎉🖤🖤🇩🇿
Thanks for making this video
nice tutorial
hi. can u please help me.when I click on start machine it starts the timer but the machine doesn't load. no Split View or anything like that. Do we have to do anything with the machineIP?
@@korabkanwar6784 the button "show split view" should appear after the machine starts, you can click.
Incredible! Where to find your notes from Obsidian?
Hi , Notes are part of the second tier of channel membership.
Please read details below
th-cam.com/channels/NSdU_1ehXtGclimTVckHmQ.htmljoin
@@MotasemHamdan Thank you for your work!
@@MotasemHamdan I'm also interested in the notes, to give a booster in my own notes. Unfortunately I can't find much information about them. I read it's over 300 pdf pages that we have online access. But is it also possible to download them?
I'm getting the answer 2812 what is wrong ?
why didnt you use botsv2 backup
Thanks man
Hello,
I have prepared and created a video on Splunk(SIEM tool) where I explained basics about Splunk and what is the use of it. If you have learned somthing from it the kindly comment.
Thanks.
th-cam.com/video/ddVmKjQYSSU/w-d-xo.htmlsi=8HgQMvHkOTxSjtQV
Splunk is not a siem tool, the SIEM part is an additional layer that provides 3mpowerment to do SIEM work.
I'm new to Cybersecurity but have Systems Administration background and I appreciate you for pointing this out.
I asked Bard if Splunk can do more than SIEM. Below is the response
Splunk can also be used for:
Security analytics: Splunk can be used to analyze security data to identify threats and vulnerabilities. It can also be used to investigate security incidents and to track the progress of remediation efforts.
Compliance reporting: Splunk can be used to generate reports that demonstrate compliance with industry regulations. This can help organizations to avoid fines and penalties.
DevOps monitoring: Splunk can be used to monitor the performance of applications and infrastructure. This can help to identify and resolve problems before they impact users.
Business intelligence: Splunk can be used to collect and analyze data from a variety of sources to gain insights into business operations. This can help organizations to make better decisions and to improve their bottom line.
How can I can get the onenote?
check this link out
buymeacoffee.com/notescatalog/e/142844?source=post_page-----764ddea197c3--------------------------------
Thank God!!! Proper videos on cyber security based around the Splunk SIEM!!!
You've made my job SO much easier. Even the official Splunk tutorials are generic for different data ingests.
You're an absolute legend mate thank you!