Course Details
Course Outline
1 - Course Introduction
Introductions and course logisticsCourse objectives
2 - Data Flows and Communication
Hardware and software requirementsArchitectureData flows
3 - Searching Data
Creating searchesAnalyzing eventsSearch operatorsAdvanced queries
4 - Policy Components
RulesLocal scannerSensor capabilities
5 - Prevention Capabilities Using Rules
Rule typesRule creationReputation priorityConfiguring rulesEvaluating rule impact
6 - Processing Alerts
Alert triageAlert actions
7 - Response Capabilities
Using quarantineUsing live responseHash banning
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Who is it For?
Target Audience
System administrators and security operations personnel, including analysts and managers