Pass the SPLK-5002 certification exam and master the practical application of Splunk in cybersecurity monitoring and defense.
Systematically master the following five major knowledge modules:
Data Engineering
Detection Engineering
Building Effective Security Processes and Programs
Automation and Efficiency
Auditing and Reporting on Security Programs
At the same time, maximize memory retention and application skills through efficient learning methods (Pomodoro Technique + Spaced Repetition).
Total Duration: 8 weeks (2 months)
Weekly Arrangement: 5 days of study + 2 days of review/adjustment
Daily Investment: 2–3 hours
Pomodoro Learning Rhythm:
Focus for 25 minutes per session → 5 minutes break.
After completing 4 Pomodoros, take a longer break of 15–20 minutes.
Spaced Repetition Plan:
Quick review once within 24 hours after first learning.
Review again after 3 days.
Review again after 7 days.
Review again after 14 days.
Conduct a final review before the exam.
Master the foundations of Data Engineering for cybersecurity in Splunk.
Be able to identify security data sources, onboard them into Splunk, normalize the fields, enrich the data, ensure data quality, and secure the ingestion pipeline.
Use the Pomodoro Technique (25 min study + 5 min break), 6 sessions per day.
Apply Ebbinghaus Forgetting Curve reviews at 24h, 3 days, 7 days intervals after each topic.
Learning Objectives:
Understand what Data Engineering means in a cybersecurity context.
Learn the most important types of security log sources.
Detailed Tasks:
Read about the role of Data Engineering in cybersecurity.
List at least 15 different security data sources (e.g., firewalls, antivirus, Active Directory, VPN, cloud providers).
Categorize these sources into groups: Network, Endpoint, Identity, Cloud, Application.
Summarize in a table: Source Name | Type | Example Data Fields.
Pomodoro Sessions:
2 Pomodoro sessions: Theory reading.
2 Pomodoro sessions: Source listing and categorization.
2 Pomodoro sessions: Table creation and summary.
Learning Objectives:
Detailed Tasks:
Study Splunk documentation on Universal Forwarders (UF) and Heavy Forwarders (HF).
Install a Universal Forwarder on a Windows virtual machine.
Configure the UF to collect Windows Security logs.
Verify successful ingestion in Splunk (basic search).
Pomodoro Sessions:
2 Pomodoro sessions: Learning collection methods.
2 Pomodoro sessions: Setting up Universal Forwarder.
2 Pomodoro sessions: Testing and verification.
Learning Objectives:
Understand field extractions.
Learn how to map raw fields into the Splunk Common Information Model (CIM).
Detailed Tasks:
Study what CIM is and why normalization is critical.
Practice using the Splunk Field Extractor to extract fields from sample firewall logs.
Map extracted fields to relevant CIM tags (e.g., src_ip, user, dest_ip).
Save your extractions and validate by searching normalized data.
Pomodoro Sessions:
2 Pomodoro sessions: CIM theory and Field Extraction basics.
2 Pomodoro sessions: Practicing field extraction.
2 Pomodoro sessions: Applying CIM mapping.
Learning Objectives:
Detailed Tasks:
Create a basic Asset Inventory Lookup Table mapping IP addresses to owners and departments.
Configure Splunk to ingest a basic Threat Intelligence Feed (use AbuseIPDB or similar).
Perform a sample correlation search: Check if any ingested IP matches the threat feed.
Pomodoro Sessions:
2 Pomodoro sessions: Asset inventory setup.
2 Pomodoro sessions: Threat feed ingestion.
2 Pomodoro sessions: Search and correlation test.
Learning Objectives:
Detailed Tasks:
Create a Saved Search that checks for missing important fields (e.g., username, src_ip).
Set up a basic alert that triggers if no logs are received from a critical source within 30 minutes.
Study examples of common data ingestion issues and how to troubleshoot.
Pomodoro Sessions:
2 Pomodoro sessions: Learning data quality metrics.
2 Pomodoro sessions: Setting up saved search and alert.
2 Pomodoro sessions: Reviewing troubleshooting best practices.
Learning Objectives:
Detailed Tasks:
Create two new indexes:
One for authentication logs (e.g., auth_logs).
One for endpoint monitoring logs (e.g., endpoint_logs).
Study Splunk's Hot → Warm → Cold → Frozen bucket lifecycle.
Configure basic retention settings (e.g., keep authentication logs for 180 days).
Pomodoro Sessions:
2 Pomodoro sessions: Indexing theory and Splunk storage concepts.
2 Pomodoro sessions: Hands-on index creation.
2 Pomodoro sessions: Setting retention policies.
Learning Objectives:
Secure data in transit and at rest.
Implement access controls in Splunk for sensitive data.
Detailed Tasks:
Configure SSL encryption between a Universal Forwarder and Indexer.
Create a Splunk Role that only allows access to non-sensitive indexes.
Assign the role to a test user and validate permissions.
Study compliance basics (PCI-DSS, HIPAA) relating to data security.
Pomodoro Sessions:
2 Pomodoro sessions: SSL configuration and testing.
2 Pomodoro sessions: Role-based access control setup.
2 Pomodoro sessions: Compliance reading and summary notes.
Review Day 1 topics on Day 2 (quick notes flashback, self-quiz).
Review Day 2 topics on Day 3, and so on.
Set 1-hour review blocks every Sunday for weekly topic consolidation.
Master advanced Data Engineering skills and start transitioning into basic Detection Engineering.
Be able to enrich, optimize, monitor, and secure your Splunk data ingestion pipelines at a professional level.
Use the Pomodoro Technique (6 sessions/day).
Follow the Ebbinghaus review method: review key topics at 1-day, 3-day, and 7-day intervals.
Learning Objectives:
Detailed Tasks:
Integrate an additional threat intelligence source (e.g., AlienVault OTX).
Configure Splunk to auto-update threat indicators daily.
Build a correlation search that matches incoming IPs or domains with known threat lists.
Pomodoro Sessions:
2 Pomodoro sessions: Study threat intelligence feed formats.
2 Pomodoro sessions: Configure feed ingestion and auto-refresh.
2 Pomodoro sessions: Build correlation search.
Learning Objectives:
Detailed Tasks:
Expand the asset inventory by adding more fields (e.g., system owner, department, criticality).
Link user identities to organizational units.
Modify an existing search to enrich results with asset or identity data.
Pomodoro Sessions:
2 Pomodoro sessions: Study Asset and Identity framework structure.
2 Pomodoro sessions: Populate expanded asset lookup tables.
2 Pomodoro sessions: Create an enrichment-enhanced search.
Learning Objectives:
Detailed Tasks:
Set up alerts when forwarders stop sending data (e.g., no data from a source in 30 minutes).
Build a dashboard showing forwarder health status.
Document procedures for troubleshooting forwarder issues.
Pomodoro Sessions:
2 Pomodoro sessions: Create forwarder heartbeat searches.
2 Pomodoro sessions: Build dashboard visualizations (pie charts, bar charts).
2 Pomodoro sessions: Write a troubleshooting checklist.
Learning Objectives:
Detailed Tasks:
Configure warm, cold, frozen bucket policies for existing indexes.
Study and simulate the use of Summary Indexing for event aggregation.
Set a frozen script (e.g., archive old data to external storage).
Pomodoro Sessions:
2 Pomodoro sessions: Configure bucket aging settings.
2 Pomodoro sessions: Create a basic summary indexing report.
2 Pomodoro sessions: Study frozen bucket archival methods.
Learning Objectives:
Detailed Tasks:
Enable audit logging for forwarders and indexers.
Secure the Management Port (port 8089) using certificates.
Enforce stronger access controls on searches (e.g., restrict access to _audit index).
Pomodoro Sessions:
2 Pomodoro sessions: Configure audit logging.
2 Pomodoro sessions: Secure management interfaces.
2 Pomodoro sessions: Create search role restrictions.
Learning Objectives:
Detailed Tasks:
Ingest a new sample dataset (e.g., Apache web server logs).
Normalize the data (field extraction + CIM mapping).
Create a saved search that correlates IP activity with threat intelligence.
Document the pipeline from source → ingestion → normalization → detection.
Pomodoro Sessions:
2 Pomodoro sessions: Data onboarding.
2 Pomodoro sessions: Field extraction and normalization.
2 Pomodoro sessions: Detection search creation and documentation.
Learning Objectives:
Detailed Tasks:
Study basic principles of Detection Engineering:
What is a correlation search?
What is a notable event?
How do we prioritize alerts?
Write your own examples of:
A good quality alert.
A poor quality alert (and why it’s bad).
List 5 real-world use cases you want to detect using Splunk (e.g., brute-force attacks, ransomware activity).
Pomodoro Sessions:
2 Pomodoro sessions: Study detection basics.
2 Pomodoro sessions: Write alert quality examples.
2 Pomodoro sessions: Create personal detection use-case list.
Quick 10–15 minute review of Day 8 topics on Day 9.
Quick review of Day 9 topics on Day 10, and so on.
Full Week 1 + Week 2 review on Sunday evening:
Begin mastering Detection Engineering.
Learn how to perform threat modeling, design high-quality correlation searches, and optimize Splunk detections.
Focus on the fundamentals of identifying attacker behavior and building efficient detection logic.
Use the Pomodoro Technique (6 sessions/day).
Apply the Ebbinghaus Forgetting Curve for structured revision.
Learning Objectives:
Understand how attackers operate by studying MITRE ATT&CK.
Start thinking like an attacker to anticipate behaviors.
Detailed Tasks:
Study the MITRE ATT&CK Framework basics: Tactics, Techniques, and Procedures (TTPs).
Choose 1 Tactic (e.g., Credential Access) and list 5 associated Techniques.
Identify which Techniques are most relevant to your organization (or a sample environment).
Sketch a simple attack path diagram linking multiple Techniques.
Pomodoro Sessions:
2 Pomodoro sessions: ATT&CK Framework theory study.
2 Pomodoro sessions: Mapping techniques to data sources.
2 Pomodoro sessions: Drawing attack path diagrams.
Learning Objectives:
Learn what makes a good correlation search.
Write your first basic SPL detection search.
Detailed Tasks:
Study how Splunk searches work: base searches vs tstats searches.
Write a basic detection SPL to identify multiple failed login attempts from the same IP within 10 minutes.
Save the search as a Correlation Search in Enterprise Security (or as a Saved Search if ES is unavailable).
Pomodoro Sessions:
2 Pomodoro sessions: Review SPL basics and correlation search settings.
2 Pomodoro sessions: Write and save a basic detection.
2 Pomodoro sessions: Test the search with simulated events.
Learning Objectives:
Detailed Tasks:
Learn how to use tstats for accelerated searching (study Splunk docs).
Rebuild the failed login detection from Day 16 using tstats instead of raw search.
Measure and compare search execution time between the raw search and tstats optimized search.
Pomodoro Sessions:
2 Pomodoro sessions: tstats syntax and examples study.
2 Pomodoro sessions: Rewrite correlation searches using tstats.
2 Pomodoro sessions: Test and time both search methods.
Learning Objectives:
Detailed Tasks:
Study methods to reduce false positives:
Threshold tuning
Context enrichment (e.g., trusted IPs, known safe accounts)
Time-based filtering (e.g., non-business hours)
Create a trusted IP lookup table.
Update an existing correlation search to exclude activities from trusted IPs.
Pomodoro Sessions:
2 Pomodoro sessions: False positive reduction theory study.
2 Pomodoro sessions: Create trusted context lookups.
2 Pomodoro sessions: Apply context filters to a detection rule.
Learning Objectives:
Detailed Tasks:
Create a Threat Coverage Matrix:
Identify gaps: Which Techniques are not currently covered?
Write a plan suggesting at least 3 new detections needed to fill these gaps.
Pomodoro Sessions:
2 Pomodoro sessions: Create and populate threat coverage matrix.
2 Pomodoro sessions: Analyze gaps and missing coverage areas.
2 Pomodoro sessions: Draft new detection ideas.
Learning Objectives:
Detailed Tasks:
Study basic adversary simulation frameworks (e.g., Atomic Red Team).
Choose a simple attack simulation (e.g., Mimikatz password dumping).
Execute the simulation safely in a controlled lab.
Check if your Splunk detections trigger correctly.
Pomodoro Sessions:
2 Pomodoro sessions: Simulation frameworks study.
2 Pomodoro sessions: Set up and execute simple simulation.
2 Pomodoro sessions: Validate detection results.
Learning Objectives:
Detailed Tasks:
Build a basic Detection Metrics Dashboard in Splunk:
Number of alerts triggered (daily, weekly)
Alert breakdown by detection rule
False Positive Rate estimates
Set up basic visualizations: pie charts, bar charts, time series trends.
Pomodoro Sessions:
2 Pomodoro sessions: Dashboard design and layout planning.
2 Pomodoro sessions: Building search panels for metrics.
2 Pomodoro sessions: Creating visualizations and alerts.
Review Day 15 topics on Day 16 (flashcards + self-quiz).
Review Day 16–18 topics on Day 19 with small practice exercises.
Full revision of all Week 3 detection topics on Day 21 evening (knowledge mind-map + practice).
Advance Detection Engineering skills to a professional level.
Learn to build modular searches, map complete attack scenarios, validate detections through simulation, and manage detection content systematically.
Use the Pomodoro Technique (6 sessions/day).
Apply the Ebbinghaus Forgetting Curve to reinforce memory at scheduled intervals.
Learning Objectives:
Detailed Tasks:
Study modular search best practices (short, specific, reusable searches).
Break down an existing detection into smaller sub-searches (e.g., login failures, successful logins, IP lookups).
Save modular sub-searches as macros or saved searches in Splunk.
Pomodoro Sessions:
2 Pomodoro sessions: Study modular search theory.
2 Pomodoro sessions: Practice breaking detections into modules.
2 Pomodoro sessions: Save and reuse sub-searches.
Learning Objectives:
Detailed Tasks:
Choose 2 real-world attack scenarios (e.g., phishing leading to credential theft, lateral movement using stolen credentials).
Write end-to-end detection logic for each scenario:
Initial activity (e.g., email click)
Exploitation (e.g., abnormal authentication)
Post-exploitation behavior (e.g., file access, process creation)
Chain searches where necessary using transaction or append commands.
Pomodoro Sessions:
2 Pomodoro sessions: Select use-cases and design detection flow.
2 Pomodoro sessions: Write detection SPLs.
2 Pomodoro sessions: Test and refine logic.
Learning Objectives:
Detailed Tasks:
Study environment tuning techniques:
Whitelisting known behavior
Adjusting thresholds (e.g., failed logins >5 becomes >10 if normal)
Business hours awareness
Review your correlation searches from previous days.
Tune at least 2 detections based on assumed or simulated environment baselines.
Pomodoro Sessions:
2 Pomodoro sessions: Study tuning strategies.
2 Pomodoro sessions: Apply tuning to searches.
2 Pomodoro sessions: Validate tuned detections with testing.
Learning Objectives:
Detailed Tasks:
Study the concept of Risk-Based Alerting (RBA):
Create risk notables instead of classic notables:
Example: Unusual login = +20 points
Unusual file access = +30 points
Total risk >50 triggers an alert
Configure a small risk incident rule in Splunk ES or simulate manually.
Pomodoro Sessions:
2 Pomodoro sessions: Study RBA concepts.
2 Pomodoro sessions: Create a basic risk scoring table.
2 Pomodoro sessions: Implement a simple risk-based detection.
Learning Objectives:
Detailed Tasks:
Simulate multi-stage attacks using Atomic Red Team or manual event generation.
Validate that your modular searches, use-case-driven detections, and RBA all trigger appropriately.
Adjust detection logic if false positives or misses are observed.
Pomodoro Sessions:
2 Pomodoro sessions: Set up complex attack simulations.
2 Pomodoro sessions: Validate detection triggers.
2 Pomodoro sessions: Debug and improve detection SPL.
Learning Objectives:
Detailed Tasks:
Study best practices for content management:
Naming conventions
Version numbers
Change logs
Set up a local Git repository (or folder system) to track detection changes.
Document metadata for each detection (purpose, fields used, risk score, last update).
Pomodoro Sessions:
2 Pomodoro sessions: Study content management practices.
2 Pomodoro sessions: Build your own detection repository.
2 Pomodoro sessions: Document at least 5 detection rules properly.
Learning Objectives:
Detailed Tasks:
Choose a complete attacker scenario (e.g., phishing → credential theft → internal reconnaissance).
Build at least 5 correlation searches to detect various stages of the attack.
Document:
Data sources required
Detection SPL
Thresholds and tuning
Risk scoring approach
Summarize results in a report or dashboard.
Pomodoro Sessions:
2 Pomodoro sessions: Attack scenario planning.
2 Pomodoro sessions: Writing and testing detections.
2 Pomodoro sessions: Reporting and dashboard creation.
Review Day 22–23 topics on Day 24.
Review Day 24–25 topics on Day 26.
Full review of Week 4 topics on Day 28 evening (mind-mapping + error correction).
Master building effective security operations processes and programs.
Learn how to structure incident response, create actionable playbooks, set up security KPIs, and align operations with GRC (Governance, Risk, and Compliance) frameworks.
Use the Pomodoro Technique (6 sessions/day).
Follow the Ebbinghaus Forgetting Curve for reviewing key knowledge areas.
Learning Objectives:
Detailed Tasks:
Study key phases: Detection → Validation → Triage → Escalation or Closure.
Define criteria for what qualifies as a “security incident” vs. an "event".
Create a flowchart for incident triage steps.
Assign hypothetical roles (e.g., Analyst 1 validates, Analyst 2 escalates).
Pomodoro Sessions:
2 Pomodoro sessions: Study and diagram triage workflow.
2 Pomodoro sessions: Define incident criteria checklist.
2 Pomodoro sessions: Role assignment and simulation.
Learning Objectives:
Detailed Tasks:
Study the IR Lifecycle: Containment → Investigation → Eradication → Recovery → Lessons Learned.
Write a Response Plan Template that includes:
Roles and responsibilities (e.g., IR Lead, Communication Lead, Forensics).
Timeframes for actions.
Simulate a sample ransomware incident response timeline.
Pomodoro Sessions:
2 Pomodoro sessions: IR lifecycle study.
2 Pomodoro sessions: Response plan writing.
2 Pomodoro sessions: Incident simulation practice.
Learning Objectives:
Detailed Tasks:
Study the structure of an effective Playbook:
Write a full Playbook for detecting and responding to phishing attacks.
Write a second, simpler daily SOP for log review or asset health monitoring.
Pomodoro Sessions:
2 Pomodoro sessions: Playbook structure study.
2 Pomodoro sessions: Phishing Playbook writing.
2 Pomodoro sessions: Daily SOP writing.
Learning Objectives:
Detailed Tasks:
Define important KPIs:
Time to Detect (TTD)
Time to Contain (TTC)
Time to Remediate (TTR)
False Positive Rate (FPR)
Build a simple metrics tracking dashboard in Splunk showing:
Incident volumes
Average response times
Unresolved incidents by severity
Pomodoro Sessions:
2 Pomodoro sessions: Study KPIs/KRIs theory.
2 Pomodoro sessions: KPI definition workshop.
2 Pomodoro sessions: Build dashboard panels.
Learning Objectives:
Detailed Tasks:
Map key detections and response activities to specific compliance requirements.
Create a GRC Control Map linking Splunk detection/searches to:
GDPR Articles (e.g., Article 32 - Security of Processing)
PCI-DSS Requirements (e.g., 10.2 - Audit Trails)
Identify gaps in compliance coverage.
Pomodoro Sessions:
2 Pomodoro sessions: Study major compliance frameworks.
2 Pomodoro sessions: Build mapping tables.
2 Pomodoro sessions: Gap analysis workshop.
Learning Objectives:
Detailed Tasks:
Create a basic Security Awareness Training Plan for employees:
Design a Tabletop Exercise for simulating a security incident:
List roles to participate in the exercise (executives, IR team, communications).
Pomodoro Sessions:
2 Pomodoro sessions: Build training content outline.
2 Pomodoro sessions: Design tabletop exercise scenario.
2 Pomodoro sessions: Participant role definition.
Learning Objectives:
Detailed Tasks:
Study how to conduct a Post-Incident Review (PIR).
Write a Post-Incident Review Template including:
Incident summary
Timeline
What worked well
What failed
Improvement Actions
Review a sample incident and simulate filling out the PIR Template.
Pomodoro Sessions:
2 Pomodoro sessions: Study PIR best practices.
2 Pomodoro sessions: Write PIR template.
2 Pomodoro sessions: Practice PIR completion with a sample case.
Review Day 29–30 topics on Day 31.
Review Day 31–32 topics on Day 33.
Final comprehensive review of the whole week on Day 35 evening.
Master cybersecurity automation and efficiency concepts.
Learn to identify automation opportunities, design SOAR playbooks, implement Human-in-the-Loop controls, and measure the success of automation strategies.
Use the Pomodoro Technique (6 sessions/day).
Follow the Ebbinghaus Forgetting Curve for structured reinforcement.
Learning Objectives:
Detailed Tasks:
Study typical Tier 1 SOC tasks ideal for automation (e.g., phishing triage, malware enrichment).
Create a table:
Identify at least 10 tasks suitable for automation and classify them based on risk and value.
Pomodoro Sessions:
2 Pomodoro sessions: Learn common automation use-cases.
2 Pomodoro sessions: Build the task evaluation table.
2 Pomodoro sessions: Prioritize automation opportunities.
Learning Objectives:
Detailed Tasks:
Study the Splunk SOAR Visual Playbook Editor interface.
Create a simple Enrichment Playbook:
Trigger: New suspicious IP.
Actions: Lookup IP reputation, enrich with geolocation info.
End: Generate a case with enrichment results.
Pomodoro Sessions:
2 Pomodoro sessions: Study Playbook building blocks.
2 Pomodoro sessions: Design the enrichment flow.
2 Pomodoro sessions: Build and test the playbook.
Learning Objectives:
Detailed Tasks:
Study the concept of Human-in-the-Loop (HitL) automation:
When is human approval necessary?
How to build approval nodes in playbooks?
Modify the Day 37 Playbook:
Pomodoro Sessions:
2 Pomodoro sessions: Study HitL theory.
2 Pomodoro sessions: Integrate approval points into the Playbook.
2 Pomodoro sessions: Test different approval/rejection flows.
Learning Objectives:
Detailed Tasks:
Create a Phishing Email Response Playbook:
Trigger: Email reported by user.
Actions:
Extract URLs.
Enrich URLs with threat intelligence.
If URL is malicious, block domain on firewall and disable user account (after approval).
Simulate the triggering of this playbook.
Pomodoro Sessions:
2 Pomodoro sessions: Design playbook logic and flowchart.
2 Pomodoro sessions: Build Playbook inside SOAR.
2 Pomodoro sessions: Simulate triggering and validate actions.
Learning Objectives:
Detailed Tasks:
Study automation metrics:
Automation Coverage (% of incidents handled automatically).
Time Saved (Reduction in MTTC - Mean Time to Contain).
Error Rate (automation errors vs. manual corrections).
Create a metrics tracking dashboard showing:
Automation success rate.
Top playbooks by number of executions.
Pomodoro Sessions:
2 Pomodoro sessions: Study automation measurement strategies.
2 Pomodoro sessions: Build metrics tracking searches.
2 Pomodoro sessions: Create dashboard visualizations.
Learning Objectives:
Detailed Tasks:
Design a 6-Month Automation Expansion Plan:
Phase 1: Automate low-risk, repetitive tasks.
Phase 2: Add medium-risk processes with Human-in-the-Loop.
Phase 3: Expand to high-value/critical incident automation.
Document required:
Tool improvements
Staff training needs
New Playbook priorities
Pomodoro Sessions:
2 Pomodoro sessions: Study scaling strategies.
2 Pomodoro sessions: Write the 6-Month Automation Plan.
2 Pomodoro sessions: Peer review or self-critique the plan.
Learning Objectives:
Detailed Tasks:
Choose a full attack scenario:
Build an End-to-End Playbook:
Write a full technical report documenting:
Playbook steps
Decision points
Metrics for success
Pomodoro Sessions:
2 Pomodoro sessions: Playbook architecture design.
2 Pomodoro sessions: Playbook building and deployment.
2 Pomodoro sessions: Report writing and presentation.
Review Day 36–37 on Day 38.
Review Day 38–39 topics on Day 40.
Full review of Week 6 on Day 42 evening with flashcards and practical testing.
Master Auditing and Reporting on Security Programs.
Learn to audit Splunk activities, build effective dashboards and reports, automate compliance reporting, and perform security trend analysis.
Use the Pomodoro Technique (6 sessions/day).
Apply the Ebbinghaus Forgetting Curve for regular knowledge reinforcement.
Learning Objectives:
Detailed Tasks:
Study Splunk’s built-in _audit index.
Identify:
Who logged into Splunk?
What searches were performed?
What configurations were changed?
Create a Saved Search listing admin logins and suspicious activities (e.g., failed logins).
Pomodoro Sessions:
2 Pomodoro sessions: Study Splunk audit mechanisms.
2 Pomodoro sessions: Build audit searches.
2 Pomodoro sessions: Save and schedule simple audit reports.
Learning Objectives:
Detailed Tasks:
Create a Splunk search that monitors:
Role changes
Elevated permissions granted
Build a dashboard panel showing:
Set an alert for unexpected admin role assignments.
Pomodoro Sessions:
2 Pomodoro sessions: Study access control audit strategies.
2 Pomodoro sessions: Write monitoring searches.
2 Pomodoro sessions: Dashboard and alert configuration.
Learning Objectives:
Detailed Tasks:
Review Incident Response timelines in Splunk ES or simulate in Splunk Core.
Build a Saved Search showing:
How many Notable Events were reviewed
How many were escalated, closed, or missed
Create a basic Incident Response Metrics Dashboard.
Pomodoro Sessions:
2 Pomodoro sessions: Understand incident workflow audits.
2 Pomodoro sessions: Build response tracking searches.
2 Pomodoro sessions: Create dashboard visualizations.
Learning Objectives:
Detailed Tasks:
Study mapping detection activities to compliance controls.
Build a Compliance Monitoring Dashboard:
Login monitoring (PCI-DSS Requirement 10)
Data access monitoring (GDPR Article 32)
Create scheduled compliance audit reports (weekly or monthly).
Pomodoro Sessions:
2 Pomodoro sessions: Study compliance mapping theory.
2 Pomodoro sessions: Create compliance dashboard panels.
2 Pomodoro sessions: Schedule automated compliance reports.
Learning Objectives:
Detailed Tasks:
Build two dashboards:
Management Dashboard (high-level summaries):
Number of incidents
Top threats
Compliance status overview
Technical Dashboard (deep technical insights):
Detailed incident types
False positive rates
Detection performance metrics
Use bar charts, pie charts, trend lines for visualization.
Pomodoro Sessions:
2 Pomodoro sessions: Management dashboard design.
2 Pomodoro sessions: Technical dashboard design.
2 Pomodoro sessions: Visualization and refinement.
Learning Objectives:
Detailed Tasks:
Create a Scheduled Report:
Weekly Notable Events Summary.
Daily Failed Login Report.
Set up automatic email delivery of reports to appropriate recipients.
Configure access controls to restrict who can view sensitive reports.
Pomodoro Sessions:
2 Pomodoro sessions: Build scheduled reports.
2 Pomodoro sessions: Set up email and alert settings.
2 Pomodoro sessions: Configure report access controls.
Learning Objectives:
Detailed Tasks:
Build a 30-Day Incident Trend Dashboard:
Number of incidents per day
Most frequent types
Seasonal patterns
Perform a Root Cause Analysis (RCA):
Select a past incident (simulated if needed).
Document:
What happened?
Why it happened?
How it was detected?
How to improve future detection.
Pomodoro Sessions:
2 Pomodoro sessions: Build trend dashboards.
2 Pomodoro sessions: RCA writing and analysis.
2 Pomodoro sessions: Consolidate RCA into executive format.
Review Day 43–44 topics on Day 45.
Review Day 45–46 topics on Day 47.
Full review of all Week 7 topics on Day 49 evening (dashboard demos + quick quiz).
Consolidate all knowledge and simulate the real SPLK-5002 exam environment.
Identify weak areas, fix knowledge gaps, practice time management, and finalize readiness for the certification exam.
Use the Pomodoro Technique (6 sessions/day).
Apply the Ebbinghaus Forgetting Curve to review key topics intensively.
Learning Objectives:
Detailed Tasks:
Summarize:
Data sources and collection methods (UF, HF, HEC, Syslog)
CIM Mapping and Field Extraction
Asset and Threat Intelligence enrichment
Indexing and Data Security
Redo 2–3 mini-labs:
Field extraction practice.
Threat intelligence correlation.
Quiz yourself with 30 flashcards focused on Data Engineering.
Pomodoro Sessions:
2 Pomodoro sessions: Theory review.
2 Pomodoro sessions: Lab refresh.
2 Pomodoro sessions: Flashcard quiz.
Learning Objectives:
Detailed Tasks:
Summarize:
MITRE ATT&CK threat modeling.
Writing correlation searches (basic + tstats optimized).
Reducing false positives (contextual filters, risk scoring).
Redo 2–3 detection SPLs:
Basic attack detection.
Advanced multi-stage detection with risk scoring.
Take a mini-mock test (10–15 questions) on Detection Engineering.
Pomodoro Sessions:
2 Pomodoro sessions: Theory review.
2 Pomodoro sessions: SPL writing practice.
2 Pomodoro sessions: Practice test and corrections.
Learning Objectives:
Detailed Tasks:
Summarize:
Incident triage and IR lifecycle.
Playbook structure and examples.
Key KPIs: TTD, TTC, TTR.
Mapping activities to compliance (GDPR, PCI-DSS).
Redo 1 IR flowchart and 1 playbook writing exercise.
Quiz yourself on security process concepts.
Pomodoro Sessions:
2 Pomodoro sessions: Concept summary.
2 Pomodoro sessions: Practical exercises.
2 Pomodoro sessions: Flashcard review.
Learning Objectives:
Detailed Tasks:
Summarize:
Automation identification matrix.
Basic and advanced SOAR playbooks (Enrichment, Response).
Human-in-the-Loop decision nodes.
Measuring automation success.
Rebuild 1 mini-playbook from scratch in SOAR (simulated if needed).
Review the 6-month scaling plan you wrote earlier.
Pomodoro Sessions:
2 Pomodoro sessions: Theory summary.
2 Pomodoro sessions: Playbook reconstruction.
2 Pomodoro sessions: Metrics and scaling strategy review.
Learning Objectives:
Detailed Tasks:
Summarize:
Splunk _audit index monitoring.
Access Control and Privilege Audit strategies.
Compliance dashboarding (PCI-DSS, GDPR).
Root Cause Analysis (RCA) process.
Redo a compliance monitoring dashboard.
Write a quick RCA report for a simulated incident.
Pomodoro Sessions:
2 Pomodoro sessions: Topic summary.
2 Pomodoro sessions: Dashboard rebuilding.
2 Pomodoro sessions: RCA writing practice.
Learning Objectives:
Detailed Tasks:
Take a full-length Mock Exam #1 (approximately 100–120 questions).
Time yourself strictly (e.g., 120 minutes).
After the exam:
Review all incorrect answers immediately.
Write explanations for wrong answers (Why was it wrong? What should be corrected?).
Focus especially on pattern errors (repeated mistakes across topics).
Pomodoro Sessions:
4 Pomodoro sessions: Full mock exam.
2 Pomodoro sessions: Mistake review and correction writing.
Learning Objectives:
Detailed Tasks:
Take Full Mock Exam #2 (new questions or shuffled ones).
Time and simulate the real exam setting exactly.
Review errors.
Create a Final Study Sheet (1–2 pages) of:
Key facts.
Formulas (e.g., MTTC, MTTD calculation examples).
Detection patterns.
Light, positive mental preparation (no cramming).
Pomodoro Sessions:
4 Pomodoro sessions: Mock exam.
2 Pomodoro sessions: Final note consolidation.
Quick 10-minute flash reviews before each day starts.
Full 1-hour review of all critical concepts after each mock exam.