Most SOC analysts see the alerts. Few understand what's behind them. Learn Splunk and Elastic SIEM in Arabic and become the analyst who reads every log, hunts every threat.

Trusted By & Aligned With






Certification-mapped courses. Entirely in Arabic. Build real-world skills with hands-on labs.
Learning Path
Before you touch a SIEM, you need to understand what you are looking at. This course builds the foundation every SOC analyst needs β logs, events, Windows and Linux analysis, MITRE ATT&CK, and how a real SOC operates. No prior security experience required.
Explore CertificationsYour first step inside Splunk. You will learn how Splunk works from the inside out β architecture, data flow, and the Search Processing Language that powers everything. By the end you will be writing real searches, building dashboards, and setting up your first alerts.
Start LearningThis is where Splunk becomes a weapon. You will ingest real security data, write correlation rules mapped to MITRE ATT&CK, and build detections that catch brute force, credential dumping, lateral movement, and C2 beaconing. This is what separates a Splunk user from a Splunk analyst.
Build DetectionsThe advanced tier. You will master Splunk Enterprise Security, build a Risk-Based Alerting framework, and learn to proactively hunt for threats that no rule has ever caught. This is the course that makes you the most dangerous analyst in the room.
Master Splunk ES
After the series
You will be prepared for these certifications
Roles You'll Master
Monitor alerts, triage incidents, and correlate SIEM events in real time.
Build Sigma rules, YARA signatures, and custom detection logic.
Write advanced SPL queries, build dashboards, and investigate security events.
Deploy and manage Elastic Stack for log ingestion, search, and SIEM workflows.
Monitor alerts, triage incidents, and correlate SIEM events in real time.
Build Sigma rules, YARA signatures, and custom detection logic.
Write advanced SPL queries, build dashboards, and investigate security events.
Deploy and manage Elastic Stack for log ingestion, search, and SIEM workflows.
Configure Splunk infrastructure, manage indexes, and optimize search performance.
Proactively hunt APTs using KQL, SPL, and behavioral analytics.
Collect, analyze, and operationalize threat intel to strengthen defenses.
Parse and correlate logs from endpoints, firewalls, and proxies.
Design, deploy, and manage SIEM platforms to detect and respond to threats at scale.
Configure Splunk infrastructure, manage indexes, and optimize search performance.
Proactively hunt APTs using KQL, SPL, and behavioral analytics.
Collect, analyze, and operationalize threat intel to strengthen defenses.
Parse and correlate logs from endpoints, firewalls, and proxies.
Design, deploy, and manage SIEM platforms to detect and respond to threats at scale.
Why Defcraft
Everything you need to master SIEM operations β Splunk and Elastic, in Arabic, from the ground up.
Both platforms. Ground up to advanced. The first time β entirely in Arabic.
Real logs. Real environments. Real scenarios. No shortcuts.
1,500+ students trained. Government. Banks. Enterprise SOC teams.
Enroll once. Access forever. No expiry. No re-subscription.
All materials, logs, and lab environments β completely free with enrollment.
Track what we're building, recording, and shipping next.
1500+ cybersecurity professionals across Saudi Arabia and Egypt chose Defcraft. You're next.