SIEM Core 2 Curriculum
Gain advanced, hands-on experience engineering SIEM environments at scale. Focus on forwarders, routing, deployment services, parsing, normalization, and syslog pipelines, culminating in an applied enterprise SIEM architecture project.
Engineering-Focused Guidance
Learn how SIEM platforms are engineered and operated in real-world environments. Concepts are taught from a data engineering and platform operations perspective, with clear explanations of how pipelines are designed, data is routed, normalized, and optimized for performance and reliability.
Enterprise SIEM Labs
Apply advanced concepts through hands-on labs focused on real SIEM engineering workflows. Build and manage ingestion pipelines, implement parsing and normalization logic, configure routing and deployment services, and validate designs through an enterprise-scale SIEM architecture project.
About the Course
TechForward SIEM Core 2 builds on the architectural foundation established in SIEM Core 1 by shifting focus from understanding how SIEM platforms work to engineering and operating them at scale. This course concentrates on the data engineering and operational layers that power real-world SIEM deployments. You’ll work hands-on with advanced ingestion pipelines, parsing and normalization logic, routing and deployment services, and syslog-based data flows to understand how security telemetry is engineered, managed, and optimized in enterprise environments. Emphasis is placed on designing reliable, scalable pipelines and understanding how data structure, routing decisions, and configuration choices impact performance and downstream analytics. Through guided, hands-on labs, you’ll implement and manage SIEM components as they would be used in production environments. This includes configuring forwarders and routing logic, building and validating parsing and normalization pipelines, and applying best practices for operating SIEM platforms at scale. The course culminates in an applied enterprise SIEM architecture project that brings these concepts together in a realistic end-to-end implementation. SIEM Core 2 is ideal for learners who have completed SIEM Core 1 or already possess a strong architectural understanding of SIEM platforms and want to specialize in SIEM engineering, data pipeline design, or enterprise-scale security analytics.
Meet Your Instructor, Russell Oyewole, SIEM Consultant
Welcome — I’m Russell, a SIEM consultant who has spent years designing, implementing, and optimizing SIEM platforms across different organizations and environments. One of the most common challenges I see is that people are taught how to use SIEM tools, but not how the platform works beneath the surface. The TechForward SIEM-Ready Program was created to close that gap. In this course, you’ll learn how SIEM systems ingest data, normalize events, execute searches, and produce meaningful detections. My goal is to give you a clear, practical understanding of SIEM fundamentals so you can work confidently with security data and build reliable analytics in real-world environments.
SIEM Core 2 Curriculum
-
1
Domain 1 - Splunk Foundations & Architecture
-
(Included in full purchase)
Module 1 - What is Big Data? The 4 v's of big data?
-
(Included in full purchase)
Module 2 - What is Splunk? (Use cases, product overview)
-
(Included in full purchase)
Module 3 - Splunk components: Indexer, Search Head, Forwarders, Deployment Server, Heavy Forwarder
-
(Included in full purchase)
Module 4 - Indexing pipeline (Parsing, Indexing, Searching)
-
(Included in full purchase)
Module 5 - Licensing and deployment options
-
(Included in full purchase)
Module 6 - Demo: Install Splunk Enterprise on Linux
-
(Included in full purchase)
Module 7 - Understanding the Splunk Application
-
(Included in full purchase)
Module 8 - Upgrading Splunk
-
(Included in full purchase)
Module 9 - Demo: Upgrading Splunk Enterprise on Linux
-
(Included in full purchase)
Module 10 - Introduction to Splunk Search Interface
-
(Included in full purchase)
-
2
Domain 2 - Search Fundamentals for Administrators
-
(Included in full purchase)
Module 1 - Basic Search Syntax
-
(Included in full purchase)
Module 2 - Essential Search Commands
-
(Included in full purchase)
Module 3 - Working with Time and Fields
-
(Included in full purchase)
Module - Lab - Validate Data Ingestion with Search
-
(Included in full purchase)
-
3
Domain 3 - Data Ingestion & Indexing Pipeline
-
(Included in full purchase)
Writing Automated Tests
-
(Included in full purchase)
Module 1 - Inputs overview: Monitor, TCP/UDP, Scripted
-
(Included in full purchase)
Module 2 - Data flow: Parsing queue to Indexing queue
-
(Included in full purchase)
Module 3 - Index-time vs Search-time operations
-
(Included in full purchase)
Module 4 - Bucket types, structure, and retention
-
(Included in full purchase)
Module 5 - Configuring inputs.conf and indexes.conf
-
(Included in full purchase)
Module 6 - Hands-on: Ingest sample logs and verify indexing
-
(Included in full purchase)
-
4
Domain 4 - Forwarders, Routing & Deployment Server
-
(Included in full purchase)
Module 1 - Universal Forwarder vs Heavy Forwarder
-
(Included in full purchase)
Module 2 - Installing and configuring forwarders
-
(Included in full purchase)
Module 3 - outputs.conf: routing to indexers or HFs
-
(Included in full purchase)
Module 4 - Configuring Deployment Server (serverclass.conf)
-
(Included in full purchase)
Module 5 - Best practices for forwarder management
-
(Included in full purchase)
Module 6 - Lab: Manage multiple forwarders with Deployment Server
-
(Included in full purchase)
-
5
Domain 5 - Data Parsing, Normalization & Syslog Pipelines
-
(Included in full purchase)
Module 1 - props.conf overview: LINE_BREAKER, TIME_PREFIX, etc.
-
(Included in full purchase)
Module 2 - Timestamp extraction, event breaking
-
(Included in full purchase)
Module 3 - transforms.conf: field extractions, routing, masking
-
(Included in full purchase)
Module 4 - Index-time vs Search-time field extraction
-
(Included in full purchase)
Module 5 - Best practices for onboarding structured/unstructured logs
-
(Included in full purchase)
Module 6 - Lab: Mask and route logs using transforms
-
(Included in full purchase)
Module 7 - Syslog, syslog-ng, and rsyslog for log ingestion
-
(Included in full purchase)
-
6
Domain 6 - Splunk Security, Authentication & Encryption
-
(Included in full purchase)
Module 1 - Security & Authentication
-
(Included in full purchase)
Module 2 - Role-based access control (authorize.conf)
-
(Included in full purchase)
Module 3 - Enabling and configuring TLS/SSL
-
(Included in full purchase)
Module 4 - Secure communication: Forwarders to Indexers
-
(Included in full purchase)
Module 5 - Lab: Implement TLS and configure secure roles
-
(Included in full purchase)
-
7
Domain 7 - Distributed Architecture & Clustering
-
(Included in full purchase)
Module 1 - Distributed Search
-
(Included in full purchase)
Module 2 - Search Head and Search Peer setup
-
(Included in full purchase)
Module 3 - Search bundles and knowledge object replication
-
(Included in full purchase)
Module 4 - KV Store: use cases and configuration
-
(Included in full purchase)
Module 5 - Lab: Connect multiple indexers to a search head
-
(Included in full purchase)
Module 6 - Indexer Clustering - What is indexer clustering? When to use it
-
(Included in full purchase)
Module 7 - Cluster Master, Peer Nodes, and Search Heads
-
(Included in full purchase)
Module 8 - Replication Factor (RF) and Search Factor (SF)
-
(Included in full purchase)
Module 9 - Bucket replication and failure recovery
-
(Included in full purchase)
Module 10 - Configuration files: server.conf, indexes.conf
-
(Included in full purchase)
Module 11 - Lab: Deploy a 3-node indexer cluster
-
(Included in full purchase)
Module 12 - Search Head Clustering - Overview of Search Head Clustering
-
(Included in full purchase)
Module 13 - Deployer configuration and app bundling
-
(Included in full purchase)
Module 14 - Cluster members communication and state sync
-
(Included in full purchase)
Module 15 - Troubleshooting SHC replication and conflicts
-
(Included in full purchase)
Module 16 - Lab: Set up a 3-node Search Head Cluster with Deployer
-
(Included in full purchase)
-
8
Domain 8 - Advanced Search & Development
-
(Included in full purchase)
Module 1 - Components of the Search Head
-
(Included in full purchase)
Module 2 - SPL (Search Processing Language)
-
(Included in full purchase)
Module 3 - CIM (Common Information Model)
-
(Included in full purchase)
Module 4 - Building Production Splunk Apps
-
(Included in full purchase)
-
9
Domain 9 - Final Splunk Enterprise Architecture Project 1
-
(Included in full purchase)
Module 1 - Final Capstone Project 1 - Design Core Splunk Backend Architecture (Domains 1, 2, 3, 6)
-
(Included in full purchase)
Module 2 - Implement core Splunk roles (Domains 1, 2, 3, 6)
-
(Included in full purchase)
Module 3 - Implement ingestion & routing using core configs (Domains 2 & 3)
-
(Included in full purchase)
Module 4 - Validate distributed search, clustering, and data flow (Domain 6)
-
(Included in full purchase)
Module 5 - Document and present architecture
-
(Included in full purchase)
-
10
Domain 10 - Final Splunk Enterprise Architecture Project 2
-
(Included in full purchase)
Module 1 - Final Capstone Project 2 - Refine & extend architecture (Domains 1, 2, 3, 6)
-
(Included in full purchase)
Module 2 - Implement full parsing & normalization pipeline (Domain 4)
-
(Included in full purchase)
Module 3 - Implement security, authentication & TLS (Domain 5)
-
(Included in full purchase)
Module 4 - End-to-end validation: data, clustering, security (Domains 2, 4, 5, 6)
-
(Included in full purchase)
Module 5 - Final presentation & documentation (Domains 1–6)
-
(Included in full purchase)
Student Testimonials
Discover how our course has transformed the testing skills and careers of our students.
Text-only testimonials are quick to scan and can highlight the value of your product at a glance.
Las Vegas, NV
The combination of text and imagery make the testimonial feel more personal and credible.
Working mom
Finally, a handbook that makes photography feel simple! It covers everything from camera settings to post-processing in a way that actually makes sense.
Amateur photographer
Ready to Advance into SIEM Engineering?
Hands-on training focused on data pipelines, scale, and enterprise SIEM implementation.