Detection and Response with XDR Integrated Security Solutions to Combat Emerging T...
861.05 MB | 00:18:59 | mp4 | 1280X720 | 16:9
Genre:eLearning |
Language:
English
Files Included :
001 Detection and Response with XDR Introduction (26.33 MB)
001 Module Introduction (9.04 MB)
001 Learning objectives (4 MB)
002 1 1 Describe the Goals of the SOC (4.61 MB)
003 1 2 Describe SOC Organization (3.16 MB)
004 1 3 Describe SOC Roles and Responsibilities (12.43 MB)
005 1 4 Describe SOC Process Flow (7.09 MB)
001 Learning objectives (4.71 MB)
003 2 2 Describe Major Categories of Threats (8.8 MB)
004 2 3 Describe Major Categories of Controls (10.13 MB)
001 Learning objectives (4.44 MB)
002 3 1 Describe the Goals of a CSIRT (5.43 MB)
001 Module Introduction (4.08 MB)
001 Learning objectives (1.97 MB)
002 4 1 Describe the Limitations of Existing Solutions (16.56 MB)
003 4 2 Identify Some of the Top Roadblocks with Existing Tools (11.64 MB)
004 4 3 Describe the Limitations with SIEMs (7.16 MB)
005 4 4 Describe the Limitations with SOARs (5 MB)
001 Learning objectives (2.67 MB)
002 5 1 Describe the Basics of XDR (6.55 MB)
003 5 2 Describe the Goals of XDR (4.36 MB)
004 5 3 Describe Cisco's Secure Approach to XDR (6.2 MB)
005 5 4 Identify the Components of XDR (12.53 MB)
006 5 5 Appreciate XDR's Differences from a SIEM and SOAR (6.22 MB)
007 5 6 Describe XDR's Real-World Outcomes (3.94 MB)
001 Learning objectives (3.32 MB)
002 6 1 Identify the Goals of an Integrated Security Stack (4.42 MB)
003 6 2 Appreciate XDR's Native and Third-Party Compatibility (5.97 MB)
004 6 3 Describe XDR's REST APIs (6.48 MB)
005 6 4 Describe XDR's Detection Analytics (7.75 MB)
006 6 5 Describe XDR's Remediation Capabilities (6.51 MB)
007 6 6 Describe XDR's OrchestrationAutomation Capabilities (7.37 MB)
008 6 7 Describe an Effective XDR Solution (3.64 MB)
001 Module Introduction (4.04 MB)
001 Learning objectives (2 MB)
002 7 1 Describe the PICERL Model (5.23 MB)
003 7 2 Describe the MITRE Framework (3.84 MB)
004 7 3 Describe Adversary Tactics, Techniques, and Procedures (TTPs) (3.42 MB)
005 7 4 Identify the Tools and Techniques for Threat Hunting (9.56 MB)
001 Learning objectives (3.65 MB)
002 8 1 Describe an Incident in XDR (85.27 MB)
003 8 2 Describe Incident Priority and MITRE Tactics (36.11 MB)
004 8 3 Identify the Components of an Incident (32.58 MB)
005 8 4 Interact with Cisco XDR's Attack Graph (10.44 MB)
006 8 5 Identify Correlating Data Using XDR (16.09 MB)
001 Learning objectives (2.96 MB)
002 9 1 Appreciate the Value of Cisco XDR Integrations for Response (12.66 MB)
003 9 2 Describe How XDR Can Respond to an Incident (30.09 MB)
004 9 3 Understand Incident Response Playbooks (45.27 MB)
001 Module Introduction (8.06 MB)
001 Learning objectives (3.14 MB)
002 10 1 Describe the Advantages of Security Automation (31.98 MB)
003 10 2 Describe the Roles of AI and Machine Learning (38.08 MB)
001 Learning objectives (3.61 MB)
002 11 1 Understand Threat Hunting and Alert Investigation (31.81 MB)
003 11 2 Describe Response Actions (40 MB)
001 Learning objectives (4.97 MB)
002 12 1 Describe XDR Automation and Its Usage (30.46 MB)
003 12 2 Explain Automation Components (45.81 MB)
004 12 3 Explore the Workflow Editor (54.38 MB)
005 12 4 Explain a Workflow Run and Troubleshooting (28.13 MB)
001 Detection and Response with XDR Summary (2.49 MB)
]
Screenshot
Коментарии
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.