种子简介
种子名称:
Detection and Response with XDR Integrated Security Solutions to Combat Emerging Threats
文件类型:
视频
文件数目:
65个文件
文件大小:
879.94 MB
收录时间:
2024-12-19 13:26
已经下载:
3次
资源热度:
4
最近下载:
2024-12-19 20:03
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:9296d84d585166bce84d7ee06f76c7e9c7ef3987&dn=Detection and Response with XDR Integrated Security Solutions to Combat Emerging Threats
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
Detection and Response with XDR Integrated Security Solutions to Combat Emerging Threats.torrent
Module 3 XDR with Cisco/Lesson 8 Investigating an Incident/002. 8.1 Describe an Incident in XDR.mp485.27MB
Introduction/001. Detection and Response with XDR Introduction.mp426.33MB
Module 1 Security Operations and Tooling/001. Module Introduction.mp49.04MB
Module 1 Security Operations and Tooling/Lesson 1 The Modern Security Operations Center/001. Learning objectives.mp44MB
Module 1 Security Operations and Tooling/Lesson 1 The Modern Security Operations Center/002. 1.1 Describe the Goals of the SOC.mp44.61MB
Module 1 Security Operations and Tooling/Lesson 1 The Modern Security Operations Center/003. 1.2 Describe SOC Organization.mp43.16MB
Module 1 Security Operations and Tooling/Lesson 1 The Modern Security Operations Center/004. 1.3 Describe SOC Roles and Responsibilities.mp412.43MB
Module 1 Security Operations and Tooling/Lesson 1 The Modern Security Operations Center/005. 1.4 Describe SOC Process Flow.mp47.09MB
Module 1 Security Operations and Tooling/Lesson 2 Security Operations Concepts and Tooling/001. Learning objectives.mp44.71MB
Module 1 Security Operations and Tooling/Lesson 2 Security Operations Concepts and Tooling/002. 2.1 Describe Basics of NIST Cybersecurity Framework (CSF).mp410.04MB
Module 1 Security Operations and Tooling/Lesson 2 Security Operations Concepts and Tooling/003. 2.2 Describe Major Categories of Threats.mp48.8MB
Module 1 Security Operations and Tooling/Lesson 2 Security Operations Concepts and Tooling/004. 2.3 Describe Major Categories of Controls.mp410.13MB
Module 1 Security Operations and Tooling/Lesson 2 Security Operations Concepts and Tooling/005. 2.4 Identify Some Popular Open-Source Tools and Their Functions.mp45.07MB
Module 1 Security Operations and Tooling/Lesson 3 Computer Security Incident Response Teams (CSIRT)/001. Learning objectives.mp44.44MB
Module 1 Security Operations and Tooling/Lesson 3 Computer Security Incident Response Teams (CSIRT)/002. 3.1 Describe the Goals of a CSIRT.mp45.43MB
Module 1 Security Operations and Tooling/Lesson 3 Computer Security Incident Response Teams (CSIRT)/003. 3.2 Appreciate the Differences Between a SOC and a CSIRT.mp44.18MB
Module 2 Extended Detection and Response (XDR)/001. Module Introduction.mp44.08MB
Module 2 Extended Detection and Response (XDR)/Lesson 4 Trends and Challenges/001. Learning objectives.mp41.97MB
Module 2 Extended Detection and Response (XDR)/Lesson 4 Trends and Challenges/002. 4.1 Describe the Limitations of Existing Solutions.mp416.56MB
Module 2 Extended Detection and Response (XDR)/Lesson 4 Trends and Challenges/003. 4.2 Identify Some of the Top Roadblocks with Existing Tools.mp411.64MB
Module 2 Extended Detection and Response (XDR)/Lesson 4 Trends and Challenges/004. 4.3 Describe the Limitations with SIEMs.mp47.16MB
Module 2 Extended Detection and Response (XDR)/Lesson 4 Trends and Challenges/005. 4.4 Describe the Limitations with SOARs.mp45MB
Module 2 Extended Detection and Response (XDR)/Lesson 5 Introducing XDR/001. Learning objectives.mp42.67MB
Module 2 Extended Detection and Response (XDR)/Lesson 5 Introducing XDR/002. 5.1 Describe the Basics of XDR.mp46.55MB
Module 2 Extended Detection and Response (XDR)/Lesson 5 Introducing XDR/003. 5.2 Describe the Goals of XDR.mp44.36MB
Module 2 Extended Detection and Response (XDR)/Lesson 5 Introducing XDR/004. 5.3 Describe Cisco's Secure Approach to XDR.mp46.2MB
Module 2 Extended Detection and Response (XDR)/Lesson 5 Introducing XDR/005. 5.4 Identify the Components of XDR.mp412.53MB
Module 2 Extended Detection and Response (XDR)/Lesson 5 Introducing XDR/006. 5.5 Appreciate XDR's Differences from a SIEM and SOAR.mp46.22MB
Module 2 Extended Detection and Response (XDR)/Lesson 5 Introducing XDR/007. 5.6 Describe XDR's Real-World Outcomes.mp43.94MB
Module 2 Extended Detection and Response (XDR)/Lesson 6 XDR's Integrated Security Stack/001. Learning objectives.mp43.32MB
Module 2 Extended Detection and Response (XDR)/Lesson 6 XDR's Integrated Security Stack/002. 6.1 Identify the Goals of an Integrated Security Stack.mp44.42MB
Module 2 Extended Detection and Response (XDR)/Lesson 6 XDR's Integrated Security Stack/003. 6.2 Appreciate XDR's Native and Third-Party Compatibility.mp45.97MB
Module 2 Extended Detection and Response (XDR)/Lesson 6 XDR's Integrated Security Stack/004. 6.3 Describe XDR's REST APIs.mp46.48MB
Module 2 Extended Detection and Response (XDR)/Lesson 6 XDR's Integrated Security Stack/005. 6.4 Describe XDR's Detection Analytics.mp47.75MB
Module 2 Extended Detection and Response (XDR)/Lesson 6 XDR's Integrated Security Stack/006. 6.5 Describe XDR's Remediation Capabilities.mp46.51MB
Module 2 Extended Detection and Response (XDR)/Lesson 6 XDR's Integrated Security Stack/007. 6.6 Describe XDR's OrchestrationAutomation Capabilities.mp47.37MB
Module 2 Extended Detection and Response (XDR)/Lesson 6 XDR's Integrated Security Stack/008. 6.7 Describe an Effective XDR Solution.mp43.64MB
Module 3 XDR with Cisco/001. Module Introduction.mp44.04MB
Module 3 XDR with Cisco/Lesson 7 Threat Hunting/001. Learning objectives.mp42MB
Module 3 XDR with Cisco/Lesson 7 Threat Hunting/002. 7.1 Describe the PICERL Model.mp45.23MB
Module 3 XDR with Cisco/Lesson 7 Threat Hunting/003. 7.2 Describe the MITRE Framework.mp43.84MB
Module 3 XDR with Cisco/Lesson 7 Threat Hunting/004. 7.3 Describe Adversary Tactics, Techniques, and Procedures (TTPs).mp43.42MB
Module 3 XDR with Cisco/Lesson 7 Threat Hunting/005. 7.4 Identify the Tools and Techniques for Threat Hunting.mp49.56MB
Module 3 XDR with Cisco/Lesson 8 Investigating an Incident/001. Learning objectives.mp43.65MB
Module 3 XDR with Cisco/Lesson 8 Investigating an Incident/003. 8.2 Describe Incident Priority and MITRE Tactics.mp436.11MB
Module 3 XDR with Cisco/Lesson 8 Investigating an Incident/004. 8.3 Identify the Components of an Incident.mp432.58MB
Module 3 XDR with Cisco/Lesson 8 Investigating an Incident/005. 8.4 Interact with Cisco XDR's Attack Graph.mp410.44MB
Module 3 XDR with Cisco/Lesson 8 Investigating an Incident/006. 8.5 Identify Correlating Data Using XDR.mp416.09MB
Module 3 XDR with Cisco/Lesson 9 Responding to an Incident/001. Learning objectives.mp42.96MB
Module 3 XDR with Cisco/Lesson 9 Responding to an Incident/002. 9.1 Appreciate the Value of Cisco XDR Integrations for Response.mp412.66MB
Module 3 XDR with Cisco/Lesson 9 Responding to an Incident/003. 9.2 Describe How XDR Can Respond to an Incident.mp430.09MB
Module 3 XDR with Cisco/Lesson 9 Responding to an Incident/004. 9.3 Understand Incident Response Playbooks.mp445.27MB
Module 4 Security Automation/001. Module Introduction.mp48.06MB
Module 4 Security Automation/Lesson 10 What Is Security Automation/001. Learning objectives.mp43.14MB
Module 4 Security Automation/Lesson 10 What Is Security Automation/002. 10.1 Describe the Advantages of Security Automation.mp431.98MB
Module 4 Security Automation/Lesson 10 What Is Security Automation/003. 10.2 Describe the Roles of AI and Machine Learning.mp438.08MB
Module 4 Security Automation/Lesson 11 How Does Automation Fit into XDR/001. Learning objectives.mp43.61MB
Module 4 Security Automation/Lesson 11 How Does Automation Fit into XDR/002. 11.1 Understand Threat Hunting and Alert Investigation.mp431.81MB
Module 4 Security Automation/Lesson 11 How Does Automation Fit into XDR/003. 11.2 Describe Response Actions.mp440MB
Module 4 Security Automation/Lesson 12 Cisco XDR Automation/001. Learning objectives.mp44.97MB
Module 4 Security Automation/Lesson 12 Cisco XDR Automation/002. 12.1 Describe XDR Automation and Its Usage.mp430.46MB
Module 4 Security Automation/Lesson 12 Cisco XDR Automation/003. 12.2 Explain Automation Components.mp445.81MB
Module 4 Security Automation/Lesson 12 Cisco XDR Automation/004. 12.3 Explore the Workflow Editor.mp454.38MB
Module 4 Security Automation/Lesson 12 Cisco XDR Automation/005. 12.4 Explain a Workflow Run and Troubleshooting.mp428.13MB
Summary/001. Detection and Response with XDR Summary.mp42.49MB