1 - Course Introduction
Introductions and course logisticsCourse objectives
2 - Data Flows and Communication
Hardware and software requirementsArchitectureData flows
3 - Searching Data
Creating searchesSearch operatorsAnalyzing processesAnalyzing binariesAdvanced queries
4 - Managing Watchlists
5 - Alert Processing
Alert creationAnalyzing alert dataAlert actions
6 - Threat Hunting in Enterprise EDR
Cognitive Attack LoopMalicious behaviors
7 - Response Capabilities
Using quarantineUsing live response
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Who is it For?
Security operations personnel, including analysts and managers