Detection and Response with XDR Integrated Security Solutions to Combat Emerging T... - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Detection and Response with XDR Integrated Security Solutions to Combat Emerging T... (/Thread-Detection-and-Response-with-XDR-Integrated-Security-Solutions-to-Combat-Emerging-T) |
Detection and Response with XDR Integrated Security Solutions to Combat Emerging T... - AD-TEAM - 11-18-2024 861.05 MB | 00:18:59 | mp4 | 1280X720 | 16:9 Genre:eLearning |Language:English
Files Included :
001 Detection and Response with XDR Introduction (26.33 MB) 001 Module Introduction (9.04 MB) 001 Learning objectives (4 MB) 002 1 1 Describe the Goals of the SOC (4.61 MB) 003 1 2 Describe SOC Organization (3.16 MB) 004 1 3 Describe SOC Roles and Responsibilities (12.43 MB) 005 1 4 Describe SOC Process Flow (7.09 MB) 001 Learning objectives (4.71 MB) 003 2 2 Describe Major Categories of Threats (8.8 MB) 004 2 3 Describe Major Categories of Controls (10.13 MB) 001 Learning objectives (4.44 MB) 002 3 1 Describe the Goals of a CSIRT (5.43 MB) 001 Module Introduction (4.08 MB) 001 Learning objectives (1.97 MB) 002 4 1 Describe the Limitations of Existing Solutions (16.56 MB) 003 4 2 Identify Some of the Top Roadblocks with Existing Tools (11.64 MB) 004 4 3 Describe the Limitations with SIEMs (7.16 MB) 005 4 4 Describe the Limitations with SOARs (5 MB) 001 Learning objectives (2.67 MB) 002 5 1 Describe the Basics of XDR (6.55 MB) 003 5 2 Describe the Goals of XDR (4.36 MB) 004 5 3 Describe Cisco's Secure Approach to XDR (6.2 MB) 005 5 4 Identify the Components of XDR (12.53 MB) 006 5 5 Appreciate XDR's Differences from a SIEM and SOAR (6.22 MB) 007 5 6 Describe XDR's Real-World Outcomes (3.94 MB) 001 Learning objectives (3.32 MB) 002 6 1 Identify the Goals of an Integrated Security Stack (4.42 MB) 003 6 2 Appreciate XDR's Native and Third-Party Compatibility (5.97 MB) 004 6 3 Describe XDR's REST APIs (6.48 MB) 005 6 4 Describe XDR's Detection Analytics (7.75 MB) 006 6 5 Describe XDR's Remediation Capabilities (6.51 MB) 007 6 6 Describe XDR's OrchestrationAutomation Capabilities (7.37 MB) 008 6 7 Describe an Effective XDR Solution (3.64 MB) 001 Module Introduction (4.04 MB) 001 Learning objectives (2 MB) 002 7 1 Describe the PICERL Model (5.23 MB) 003 7 2 Describe the MITRE Framework (3.84 MB) 004 7 3 Describe Adversary Tactics, Techniques, and Procedures (TTPs) (3.42 MB) 005 7 4 Identify the Tools and Techniques for Threat Hunting (9.56 MB) 001 Learning objectives (3.65 MB) 002 8 1 Describe an Incident in XDR (85.27 MB) 003 8 2 Describe Incident Priority and MITRE Tactics (36.11 MB) 004 8 3 Identify the Components of an Incident (32.58 MB) 005 8 4 Interact with Cisco XDR's Attack Graph (10.44 MB) 006 8 5 Identify Correlating Data Using XDR (16.09 MB) 001 Learning objectives (2.96 MB) 002 9 1 Appreciate the Value of Cisco XDR Integrations for Response (12.66 MB) 003 9 2 Describe How XDR Can Respond to an Incident (30.09 MB) 004 9 3 Understand Incident Response Playbooks (45.27 MB) 001 Module Introduction (8.06 MB) 001 Learning objectives (3.14 MB) 002 10 1 Describe the Advantages of Security Automation (31.98 MB) 003 10 2 Describe the Roles of AI and Machine Learning (38.08 MB) 001 Learning objectives (3.61 MB) 002 11 1 Understand Threat Hunting and Alert Investigation (31.81 MB) 003 11 2 Describe Response Actions (40 MB) 001 Learning objectives (4.97 MB) 002 12 1 Describe XDR Automation and Its Usage (30.46 MB) 003 12 2 Explain Automation Components (45.81 MB) 004 12 3 Explore the Workflow Editor (54.38 MB) 005 12 4 Explain a Workflow Run and Troubleshooting (28.13 MB) 001 Detection and Response with XDR Summary (2.49 MB)] Screenshot |