本站已收录 番号和无损神作磁力链接/BT种子 

Detection and Response with XDR Integrated Security Solutions to Combat Emerging Threats

种子简介

种子名称: Detection and Response with XDR Integrated Security Solutions to Combat Emerging Threats
文件类型: 视频
文件数目: 65个文件
文件大小: 879.94 MB
收录时间: 2024-12-19 13:26
已经下载: 3
资源热度: 4
最近下载: 2024-12-19 20:03

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:9296d84d585166bce84d7ee06f76c7e9c7ef3987&dn=Detection and Response with XDR Integrated Security Solutions to Combat Emerging Threats 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

Detection and Response with XDR Integrated Security Solutions to Combat Emerging Threats.torrent
  • Module 3 XDR with Cisco/Lesson 8 Investigating an Incident/002. 8.1 Describe an Incident in XDR.mp485.27MB
  • Introduction/001. Detection and Response with XDR Introduction.mp426.33MB
  • Module 1 Security Operations and Tooling/001. Module Introduction.mp49.04MB
  • Module 1 Security Operations and Tooling/Lesson 1 The Modern Security Operations Center/001. Learning objectives.mp44MB
  • Module 1 Security Operations and Tooling/Lesson 1 The Modern Security Operations Center/002. 1.1 Describe the Goals of the SOC.mp44.61MB
  • Module 1 Security Operations and Tooling/Lesson 1 The Modern Security Operations Center/003. 1.2 Describe SOC Organization.mp43.16MB
  • Module 1 Security Operations and Tooling/Lesson 1 The Modern Security Operations Center/004. 1.3 Describe SOC Roles and Responsibilities.mp412.43MB
  • Module 1 Security Operations and Tooling/Lesson 1 The Modern Security Operations Center/005. 1.4 Describe SOC Process Flow.mp47.09MB
  • Module 1 Security Operations and Tooling/Lesson 2 Security Operations Concepts and Tooling/001. Learning objectives.mp44.71MB
  • Module 1 Security Operations and Tooling/Lesson 2 Security Operations Concepts and Tooling/002. 2.1 Describe Basics of NIST Cybersecurity Framework (CSF).mp410.04MB
  • Module 1 Security Operations and Tooling/Lesson 2 Security Operations Concepts and Tooling/003. 2.2 Describe Major Categories of Threats.mp48.8MB
  • Module 1 Security Operations and Tooling/Lesson 2 Security Operations Concepts and Tooling/004. 2.3 Describe Major Categories of Controls.mp410.13MB
  • Module 1 Security Operations and Tooling/Lesson 2 Security Operations Concepts and Tooling/005. 2.4 Identify Some Popular Open-Source Tools and Their Functions.mp45.07MB
  • Module 1 Security Operations and Tooling/Lesson 3 Computer Security Incident Response Teams (CSIRT)/001. Learning objectives.mp44.44MB
  • Module 1 Security Operations and Tooling/Lesson 3 Computer Security Incident Response Teams (CSIRT)/002. 3.1 Describe the Goals of a CSIRT.mp45.43MB
  • Module 1 Security Operations and Tooling/Lesson 3 Computer Security Incident Response Teams (CSIRT)/003. 3.2 Appreciate the Differences Between a SOC and a CSIRT.mp44.18MB
  • Module 2 Extended Detection and Response (XDR)/001. Module Introduction.mp44.08MB
  • Module 2 Extended Detection and Response (XDR)/Lesson 4 Trends and Challenges/001. Learning objectives.mp41.97MB
  • Module 2 Extended Detection and Response (XDR)/Lesson 4 Trends and Challenges/002. 4.1 Describe the Limitations of Existing Solutions.mp416.56MB
  • Module 2 Extended Detection and Response (XDR)/Lesson 4 Trends and Challenges/003. 4.2 Identify Some of the Top Roadblocks with Existing Tools.mp411.64MB
  • Module 2 Extended Detection and Response (XDR)/Lesson 4 Trends and Challenges/004. 4.3 Describe the Limitations with SIEMs.mp47.16MB
  • Module 2 Extended Detection and Response (XDR)/Lesson 4 Trends and Challenges/005. 4.4 Describe the Limitations with SOARs.mp45MB
  • Module 2 Extended Detection and Response (XDR)/Lesson 5 Introducing XDR/001. Learning objectives.mp42.67MB
  • Module 2 Extended Detection and Response (XDR)/Lesson 5 Introducing XDR/002. 5.1 Describe the Basics of XDR.mp46.55MB
  • Module 2 Extended Detection and Response (XDR)/Lesson 5 Introducing XDR/003. 5.2 Describe the Goals of XDR.mp44.36MB
  • Module 2 Extended Detection and Response (XDR)/Lesson 5 Introducing XDR/004. 5.3 Describe Cisco's Secure Approach to XDR.mp46.2MB
  • Module 2 Extended Detection and Response (XDR)/Lesson 5 Introducing XDR/005. 5.4 Identify the Components of XDR.mp412.53MB
  • Module 2 Extended Detection and Response (XDR)/Lesson 5 Introducing XDR/006. 5.5 Appreciate XDR's Differences from a SIEM and SOAR.mp46.22MB
  • Module 2 Extended Detection and Response (XDR)/Lesson 5 Introducing XDR/007. 5.6 Describe XDR's Real-World Outcomes.mp43.94MB
  • Module 2 Extended Detection and Response (XDR)/Lesson 6 XDR's Integrated Security Stack/001. Learning objectives.mp43.32MB
  • Module 2 Extended Detection and Response (XDR)/Lesson 6 XDR's Integrated Security Stack/002. 6.1 Identify the Goals of an Integrated Security Stack.mp44.42MB
  • Module 2 Extended Detection and Response (XDR)/Lesson 6 XDR's Integrated Security Stack/003. 6.2 Appreciate XDR's Native and Third-Party Compatibility.mp45.97MB
  • Module 2 Extended Detection and Response (XDR)/Lesson 6 XDR's Integrated Security Stack/004. 6.3 Describe XDR's REST APIs.mp46.48MB
  • Module 2 Extended Detection and Response (XDR)/Lesson 6 XDR's Integrated Security Stack/005. 6.4 Describe XDR's Detection Analytics.mp47.75MB
  • Module 2 Extended Detection and Response (XDR)/Lesson 6 XDR's Integrated Security Stack/006. 6.5 Describe XDR's Remediation Capabilities.mp46.51MB
  • Module 2 Extended Detection and Response (XDR)/Lesson 6 XDR's Integrated Security Stack/007. 6.6 Describe XDR's OrchestrationAutomation Capabilities.mp47.37MB
  • Module 2 Extended Detection and Response (XDR)/Lesson 6 XDR's Integrated Security Stack/008. 6.7 Describe an Effective XDR Solution.mp43.64MB
  • Module 3 XDR with Cisco/001. Module Introduction.mp44.04MB
  • Module 3 XDR with Cisco/Lesson 7 Threat Hunting/001. Learning objectives.mp42MB
  • Module 3 XDR with Cisco/Lesson 7 Threat Hunting/002. 7.1 Describe the PICERL Model.mp45.23MB
  • Module 3 XDR with Cisco/Lesson 7 Threat Hunting/003. 7.2 Describe the MITRE Framework.mp43.84MB
  • Module 3 XDR with Cisco/Lesson 7 Threat Hunting/004. 7.3 Describe Adversary Tactics, Techniques, and Procedures (TTPs).mp43.42MB
  • Module 3 XDR with Cisco/Lesson 7 Threat Hunting/005. 7.4 Identify the Tools and Techniques for Threat Hunting.mp49.56MB
  • Module 3 XDR with Cisco/Lesson 8 Investigating an Incident/001. Learning objectives.mp43.65MB
  • Module 3 XDR with Cisco/Lesson 8 Investigating an Incident/003. 8.2 Describe Incident Priority and MITRE Tactics.mp436.11MB
  • Module 3 XDR with Cisco/Lesson 8 Investigating an Incident/004. 8.3 Identify the Components of an Incident.mp432.58MB
  • Module 3 XDR with Cisco/Lesson 8 Investigating an Incident/005. 8.4 Interact with Cisco XDR's Attack Graph.mp410.44MB
  • Module 3 XDR with Cisco/Lesson 8 Investigating an Incident/006. 8.5 Identify Correlating Data Using XDR.mp416.09MB
  • Module 3 XDR with Cisco/Lesson 9 Responding to an Incident/001. Learning objectives.mp42.96MB
  • Module 3 XDR with Cisco/Lesson 9 Responding to an Incident/002. 9.1 Appreciate the Value of Cisco XDR Integrations for Response.mp412.66MB
  • Module 3 XDR with Cisco/Lesson 9 Responding to an Incident/003. 9.2 Describe How XDR Can Respond to an Incident.mp430.09MB
  • Module 3 XDR with Cisco/Lesson 9 Responding to an Incident/004. 9.3 Understand Incident Response Playbooks.mp445.27MB
  • Module 4 Security Automation/001. Module Introduction.mp48.06MB
  • Module 4 Security Automation/Lesson 10 What Is Security Automation/001. Learning objectives.mp43.14MB
  • Module 4 Security Automation/Lesson 10 What Is Security Automation/002. 10.1 Describe the Advantages of Security Automation.mp431.98MB
  • Module 4 Security Automation/Lesson 10 What Is Security Automation/003. 10.2 Describe the Roles of AI and Machine Learning.mp438.08MB
  • Module 4 Security Automation/Lesson 11 How Does Automation Fit into XDR/001. Learning objectives.mp43.61MB
  • Module 4 Security Automation/Lesson 11 How Does Automation Fit into XDR/002. 11.1 Understand Threat Hunting and Alert Investigation.mp431.81MB
  • Module 4 Security Automation/Lesson 11 How Does Automation Fit into XDR/003. 11.2 Describe Response Actions.mp440MB
  • Module 4 Security Automation/Lesson 12 Cisco XDR Automation/001. Learning objectives.mp44.97MB
  • Module 4 Security Automation/Lesson 12 Cisco XDR Automation/002. 12.1 Describe XDR Automation and Its Usage.mp430.46MB
  • Module 4 Security Automation/Lesson 12 Cisco XDR Automation/003. 12.2 Explain Automation Components.mp445.81MB
  • Module 4 Security Automation/Lesson 12 Cisco XDR Automation/004. 12.3 Explore the Workflow Editor.mp454.38MB
  • Module 4 Security Automation/Lesson 12 Cisco XDR Automation/005. 12.4 Explain a Workflow Run and Troubleshooting.mp428.13MB
  • Summary/001. Detection and Response with XDR Summary.mp42.49MB