PREMIUM ACCOUNTS

Support downtopc by buying or renewing your premium account using below links:







Partners
warezload

movieblogarea download
katzdownload

Oreilly - Detection and Response with XDR Integrated Security Solutions to Combat ...

Category: Courses / Others
Author: AD-TEAM
Date added: 10.12.2024 :24:21
Views: 0
Comments: 0










Description material
Oreilly - Detection and Response with XDR Integrated Security Solutions to Combat ...
906.68 MB | 00:18:59 | mp4 | 1280X720 | 16:9
Genre:eLearning |Language:English



Files Included :
1 1 Describe the Goals of the SOC (4.61 MB)
1 2 Describe SOC Organization (3.16 MB)
1 3 Describe SOC Roles and Responsibilities (12.43 MB)
1 4 Describe SOC Process Flow (7.09 MB)
10 1 Describe the Advantages of Security Automation (31.98 MB)
10 2 Describe the Roles of AI and Machine Learning (38.08 MB)
11 1 Understand Threat Hunting and Alert Investigation (31.81 MB)
11 2 Describe Response Actions (40 MB)
12 1 Describe XDR Automation and Its Usage (30.46 MB)
12 2 Explain Automation Components (45.81 MB)
12 3 Explore the Workflow Editor (54.38 MB)
12 4 Explain a Workflow Run and Troubleshooting (28.13 MB)
2 1 Describe Basics of NIST Cybersecurity Framework (CSF) (10.04 MB)
2 2 Describe Major Categories of Threats (8.8 MB)
2 3 Describe Major Categories of Controls (10.13 MB)
2 4 Identify Some Popular Open-Source Tools and Their Functions (5.07 MB)
3 1 Describe the Goals of a CSIRT (5.43 MB)
3 2 Appreciate the Differences Between a SOC and a CSIRT (4.18 MB)
4 1 Describe the Limitations of Existing Solutions (16.56 MB)
4 2 Identify Some of the Top Roadblocks with Existing Tools (11.64 MB)
4 3 Describe the Limitations with SIEMs (7.16 MB)
4 4 Describe the Limitations with SOARs (5 MB)
5 1 Describe the Basics of XDR (6.55 MB)
5 2 Describe the Goals of XDR (4.36 MB)
5 3 Describe Cisco's Secure Approach to XDR (6.2 MB)
5 4 Identify the Components of XDR (12.53 MB)
5 5 Appreciate XDR's Differences from a SIEM and SOAR (6.22 MB)
5 6 Describe XDR's Real-World Outcomes (3.94 MB)
6 1 Identify the Goals of an Integrated Security Stack (4.42 MB)
6 2 Appreciate XDR's Native and Third-Party Compatibility (5.97 MB)
6 3 Describe XDR's REST APIs (6.48 MB)
6 4 Describe XDR's Detection Analytics (7.75 MB)
6 5 Describe XDR's Remediation Capabilities (6.51 MB)
6 6 Describe XDR's OrchestrationAutomation Capabilities (7.37 MB)
6 7 Describe an Effective XDR Solution (3.64 MB)
7 1 Describe the PICERL Model (5.23 MB)
7 2 Describe the MITRE Framework (3.84 MB)
7 3 Describe Adversary Tactics, Techniques, and Procedures (TTPs) (3.42 MB)
7 4 Identify the Tools and Techniques for Threat Hunting (9.56 MB)
8 1 Describe an Incident in XDR (85.27 MB)
8 2 Describe Incident Priority and MITRE Tactics (36.11 MB)
8 3 Identify the Components of an Incident (32.58 MB)
8 4 Interact with Cisco XDR's Attack Graph (10.44 MB)
8 5 Identify Correlating Data Using XDR (16.09 MB)
9 1 Appreciate the Value of Cisco XDR Integrations for Response (12.66 MB)
9 2 Describe How XDR Can Respond to an Incident (30.09 MB)
9 3 Understand Incident Response Playbooks (45.27 MB)
Detection and Response with XDR Introduction (1) (26.33 MB)
Detection and Response with XDR Introduction (26.33 MB)
Detection and Response with XDR Summary (2.49 MB)
Learning objectives (1) (4.71 MB)
Learning objectives (10) (3.61 MB)
Learning objectives (11) (4.97 MB)
Learning objectives (2) (4.44 MB)
Learning objectives (3) (1.97 MB)
Learning objectives (4) (2.67 MB)
Learning objectives (5) (3.32 MB)
Learning objectives (6) (2 MB)
Learning objectives (7) (3.65 MB)
Learning objectives (8) (2.96 MB)
Learning objectives (9) (3.14 MB)
Learning objectives (4 MB)
Module Introduction (1) (4.08 MB)
Module Introduction (2) (4.04 MB)
Module Introduction (3) (8.06 MB)
Module Introduction (9.04 MB)]
Screenshot


Join to our telegram Group
Information
Users of Guests are not allowed to comment this publication.
Choose Site Language
Keep downtopc Online Please

PREMIUM ACCOUNTS

Support downtopc by buying or renewing your premium account using below links: