Beginner Free

Installing Splunk SOAR

Build, Configure, and Master Intrusion Detection with Snort in Your Own Lab

Self-Paced by Rajneesh Gupta

Overview

This project guides you through the complete setup of Splunk SOAR (Phantom) on a Linux environment — from system preparation and dependency installation to configuring services and accessing the web GUI. By the end, you’ll have a fully functional SOAR platform ready for automation and security orchestration tasks.

What You'll Learn

  • Splunk SOAR Installation

    Learn how to download, extract, and install Splunk SOAR (Phantom) step by step on a Linux system.

  • System Preparation

    Understand how to update the OS, install dependencies, enable time sync, and configure a non-privileged user for security.

  • SOAR Configuration

    Gain experience preparing the system, setting resource limits, and enabling services required for Splunk SOAR.

  • GUI Access & Login

    Learn how to access Splunk SOAR via the web interface, use default credentials, and verify successful installation.

Prerequisites

  • Basic Linux commands (`yum`, `wget`, `tar`)
  • System admin tasks (users, packages, services)
  • Networking basics (IP, HTTPS access)

About Trainer

Rajneesh Gupta

Rajneesh Gupta

Rajneesh Gupta is a seasoned cybersecurity professional with over 11 years of industry experience. With a remarkable career focused on incident response, penetration testing, security compliance, and risk management, Rajneesh has established himself as a leading expert in the field. He is also an accomplished author, having penned the book "Hands-on with Blockchain and Cybersecurity". As a dedicated educator, Rajneesh has made a significant impact on the cybersecurity community by training over 60,000 students globally.

Related Projects

Apache Server Log Analysis using Splunk
Pro Intermediate

Apache Server Log Analysis using Splunk

Detecting Brute Force, SQL Injection, XSS, and Suspicious Web Activity from Apache Access Logs with Splunk SIEM

Wazuh + n8n +  Anyrun: Automated Malware Analysis
Pro Intermediate

Wazuh + n8n + Anyrun: Automated Malware Analysis

Automate malware analysis by sending Wazuh-detected suspicious files into ANY.RUN, retrieving detailed reports and IOCs, and integrating results back into your SOC workflow.

Apache Web Server Log Monitoring using Wazuh
Pro Beginner

Apache Web Server Log Monitoring using Wazuh

Real-time detection of HTTP errors, brute-force and suspicious requests from Apache logs