Put your knowledge into practice with gamified cyber security challenges.
Threat Hunting
Apply Attack-Based Hunting methodology using Splunk to analyze and correlate diverse network and host logs, identifying multiple distinct cyberattack scenarios.