SIEM Core 2 Curriculum

Gain advanced, hands-on experience engineering SIEM environments at scale. Focus on forwarders, routing, deployment services, parsing, normalization, and syslog pipelines, culminating in an applied enterprise SIEM architecture project.

Engineering-Focused Guidance

Learn how SIEM platforms are engineered and operated in real-world environments. Concepts are taught from a data engineering and platform operations perspective, with clear explanations of how pipelines are designed, data is routed, normalized, and optimized for performance and reliability.

Enterprise SIEM Labs

Apply advanced concepts through hands-on labs focused on real SIEM engineering workflows. Build and manage ingestion pipelines, implement parsing and normalization logic, configure routing and deployment services, and validate designs through an enterprise-scale SIEM architecture project.

About the Course

TechForward SIEM Core 2 builds on the architectural foundation established in SIEM Core 1 by shifting focus from understanding how SIEM platforms work to engineering and operating them at scale. This course concentrates on the data engineering and operational layers that power real-world SIEM deployments. You’ll work hands-on with advanced ingestion pipelines, parsing and normalization logic, routing and deployment services, and syslog-based data flows to understand how security telemetry is engineered, managed, and optimized in enterprise environments. Emphasis is placed on designing reliable, scalable pipelines and understanding how data structure, routing decisions, and configuration choices impact performance and downstream analytics. Through guided, hands-on labs, you’ll implement and manage SIEM components as they would be used in production environments. This includes configuring forwarders and routing logic, building and validating parsing and normalization pipelines, and applying best practices for operating SIEM platforms at scale. The course culminates in an applied enterprise SIEM architecture project that brings these concepts together in a realistic end-to-end implementation. SIEM Core 2 is ideal for learners who have completed SIEM Core 1 or already possess a strong architectural understanding of SIEM platforms and want to specialize in SIEM engineering, data pipeline design, or enterprise-scale security analytics.

Meet Your Instructor,  Russell Oyewole, SIEM Consultant

Welcome — I’m Russell, a SIEM consultant who has spent years designing, implementing, and optimizing SIEM platforms across different organizations and environments. One of the most common challenges I see is that people are taught how to use SIEM tools, but not how the platform works beneath the surface. The TechForward SIEM-Ready Program was created to close that gap. In this course, you’ll learn how SIEM systems ingest data, normalize events, execute searches, and produce meaningful detections. My goal is to give you a clear, practical understanding of SIEM fundamentals so you can work confidently with security data and build reliable analytics in real-world environments.

SIEM Core 2 Curriculum

  1. 1

    Domain 1 - Splunk Foundations & Architecture

    1. (Included in full purchase)
    2. (Included in full purchase)
    3. (Included in full purchase)
    4. (Included in full purchase)
    5. (Included in full purchase)
    6. (Included in full purchase)
    7. (Included in full purchase)
    8. (Included in full purchase)
    9. (Included in full purchase)
    10. (Included in full purchase)
  2. 2

    Domain 2 - Search Fundamentals for Administrators

    1. (Included in full purchase)
    2. (Included in full purchase)
    3. (Included in full purchase)
    4. (Included in full purchase)
  3. 3

    Domain 3 - Data Ingestion & Indexing Pipeline

    1. (Included in full purchase)
    2. (Included in full purchase)
    3. (Included in full purchase)
    4. (Included in full purchase)
    5. (Included in full purchase)
    6. (Included in full purchase)
    7. (Included in full purchase)
  4. 4

    Domain 4 - Forwarders, Routing & Deployment Server

    1. (Included in full purchase)
    2. (Included in full purchase)
    3. (Included in full purchase)
    4. (Included in full purchase)
    5. (Included in full purchase)
    6. (Included in full purchase)
  5. 5

    Domain 5 - Data Parsing, Normalization & Syslog Pipelines

    1. (Included in full purchase)
    2. (Included in full purchase)
    3. (Included in full purchase)
    4. (Included in full purchase)
    5. (Included in full purchase)
    6. (Included in full purchase)
    7. (Included in full purchase)
  6. 6

    Domain 6 - Splunk Security, Authentication & Encryption

    1. (Included in full purchase)
    2. (Included in full purchase)
    3. (Included in full purchase)
    4. (Included in full purchase)
    5. (Included in full purchase)
  7. 7

    Domain 7 - Distributed Architecture & Clustering

    1. (Included in full purchase)
    2. (Included in full purchase)
    3. (Included in full purchase)
    4. (Included in full purchase)
    5. (Included in full purchase)
    6. (Included in full purchase)
    7. (Included in full purchase)
    8. (Included in full purchase)
    9. (Included in full purchase)
    10. (Included in full purchase)
    11. (Included in full purchase)
    12. (Included in full purchase)
    13. (Included in full purchase)
    14. (Included in full purchase)
    15. (Included in full purchase)
    16. (Included in full purchase)
  8. 8

    Domain 8 - Advanced Search & Development

    1. (Included in full purchase)
    2. (Included in full purchase)
    3. (Included in full purchase)
    4. (Included in full purchase)
  9. 9

    Domain 9 - Final Splunk Enterprise Architecture Project 1

    1. (Included in full purchase)
    2. (Included in full purchase)
    3. (Included in full purchase)
    4. (Included in full purchase)
    5. (Included in full purchase)
  10. 10

    Domain 10 - Final Splunk Enterprise Architecture Project 2

    1. (Included in full purchase)
    2. (Included in full purchase)
    3. (Included in full purchase)
    4. (Included in full purchase)
    5. (Included in full purchase)

Student Testimonials

Discover how our course has transformed the testing skills and careers of our students.

Text-only testimonials are quick to scan and can highlight the value of your product at a glance.
Jessica L.

Las Vegas, NV

The combination of text and imagery make the testimonial feel more personal and credible.
Ashley T.

Working mom

Finally, a handbook that makes photography feel simple! It covers everything from camera settings to post-processing in a way that actually makes sense.
Anna W.

Amateur photographer

Ready to Advance into SIEM Engineering?

Hands-on training focused on data pipelines, scale, and enterprise SIEM implementation.

Please contact us for access. (opens email in new window)