https://img87.pixhost.to/images/599/359020115_tuto.jpg
861.05 MB | 00:18:59 | mp4 | 1280X720  | 16:9
Genre:eLearning |Language:English


Files Included :
001  Detection and Response with XDR Introduction  (26.33 MB)
001  Module Introduction  (9.04 MB)
001  Learning objectives  (4 MB)
002  1 1 Describe the Goals of the SOC  (4.61 MB)
003  1 2 Describe SOC Organization  (3.16 MB)
004  1 3 Describe SOC Roles and Responsibilities  (12.43 MB)
005  1 4 Describe SOC Process Flow  (7.09 MB)
001  Learning objectives  (4.71 MB)
003  2 2 Describe Major Categories of Threats  (8.8 MB)
004  2 3 Describe Major Categories of Controls  (10.13 MB)
001  Learning objectives  (4.44 MB)
002  3 1 Describe the Goals of a CSIRT  (5.43 MB)
001  Module Introduction  (4.08 MB)
001  Learning objectives  (1.97 MB)
002  4 1 Describe the Limitations of Existing Solutions  (16.56 MB)
003  4 2 Identify Some of the Top Roadblocks with Existing Tools  (11.64 MB)
004  4 3 Describe the Limitations with SIEMs  (7.16 MB)
005  4 4 Describe the Limitations with SOARs  (5 MB)
001  Learning objectives  (2.67 MB)
002  5 1 Describe the Basics of XDR  (6.55 MB)
003  5 2 Describe the Goals of XDR  (4.36 MB)
004  5 3 Describe Cisco's Secure Approach to XDR  (6.2 MB)
005  5 4 Identify the Components of XDR  (12.53 MB)
006  5 5 Appreciate XDR's Differences from a SIEM and SOAR  (6.22 MB)
007  5 6 Describe XDR's Real-World Outcomes  (3.94 MB)
001  Learning objectives  (3.32 MB)
002  6 1 Identify the Goals of an Integrated Security Stack  (4.42 MB)
003  6 2 Appreciate XDR's Native and Third-Party Compatibility  (5.97 MB)
004  6 3 Describe XDR's REST APIs  (6.48 MB)
005  6 4 Describe XDR's Detection Analytics  (7.75 MB)
006  6 5 Describe XDR's Remediation Capabilities  (6.51 MB)
007  6 6 Describe XDR's OrchestrationAutomation Capabilities  (7.37 MB)
008  6 7 Describe an Effective XDR Solution  (3.64 MB)
001  Module Introduction  (4.04 MB)
001  Learning objectives  (2 MB)
002  7 1 Describe the PICERL Model  (5.23 MB)
003  7 2 Describe the MITRE Framework  (3.84 MB)
004  7 3 Describe Adversary Tactics, Techniques, and Procedures (TTPs)  (3.42 MB)
005  7 4 Identify the Tools and Techniques for Threat Hunting  (9.56 MB)
001  Learning objectives  (3.65 MB)
002  8 1 Describe an Incident in XDR  (85.27 MB)
003  8 2 Describe Incident Priority and MITRE Tactics  (36.11 MB)
004  8 3 Identify the Components of an Incident  (32.58 MB)
005  8 4 Interact with Cisco XDR's Attack Graph  (10.44 MB)
006  8 5 Identify Correlating Data Using XDR  (16.09 MB)
001  Learning objectives  (2.96 MB)
002  9 1 Appreciate the Value of Cisco XDR Integrations for Response  (12.66 MB)
003  9 2 Describe How XDR Can Respond to an Incident  (30.09 MB)
004  9 3 Understand Incident Response Playbooks  (45.27 MB)
001  Module Introduction  (8.06 MB)
001  Learning objectives  (3.14 MB)
002  10 1 Describe the Advantages of Security Automation  (31.98 MB)
003  10 2 Describe the Roles of AI and Machine Learning  (38.08 MB)
001  Learning objectives  (3.61 MB)
002  11 1 Understand Threat Hunting and Alert Investigation  (31.81 MB)
003  11 2 Describe Response Actions  (40 MB)
001  Learning objectives  (4.97 MB)
002  12 1 Describe XDR Automation and Its Usage  (30.46 MB)
003  12 2 Explain Automation Components  (45.81 MB)
004  12 3 Explore the Workflow Editor  (54.38 MB)
005  12 4 Explain a Workflow Run and Troubleshooting  (28.13 MB)
001  Detection and Response with XDR Summary  (2.49 MB)]
Screenshot
https://images2.imgbox.com/01/2f/FlrVJyJx_o.jpg


RapidGator

Код:
https://rapidgator.net/file/a6eec6d024ad92be0e4d3adb43afed18/Detection.and.Response.with.XDR.Integrated.Security.Solutions.to.Combat.Emerging.Threats.rar

TurboBit

Код:
https://turbobit.net/1yhxtfak8e2b/Detection.and.Response.with.XDR.Integrated.Security.Solutions.to.Combat.Emerging.Threats.rar.html