Download link
File List
-
Module 3 XDR with Cisco/Lesson 8 Investigating an Incident/002. 8.1 Describe an Incident in XDR.mp4 85.27 MB
Introduction/001. Detection and Response with XDR Introduction.mp4 26.33 MB
Module 1 Security Operations and Tooling/001. Module Introduction.en.srt 1.43 KB
Module 1 Security Operations and Tooling/001. Module Introduction.mp4 9.04 MB
Module 1 Security Operations and Tooling/Lesson 1 The Modern Security Operations Center/001. Learning objectives.en.srt 497 B
Module 1 Security Operations and Tooling/Lesson 1 The Modern Security Operations Center/001. Learning objectives.mp4 4 MB
Module 1 Security Operations and Tooling/Lesson 1 The Modern Security Operations Center/002. 1.1 Describe the Goals of the SOC.en.srt 1.87 KB
Module 1 Security Operations and Tooling/Lesson 1 The Modern Security Operations Center/002. 1.1 Describe the Goals of the SOC.mp4 4.61 MB
Module 1 Security Operations and Tooling/Lesson 1 The Modern Security Operations Center/003. 1.2 Describe SOC Organization.en.srt 1.21 KB
Module 1 Security Operations and Tooling/Lesson 1 The Modern Security Operations Center/003. 1.2 Describe SOC Organization.mp4 3.16 MB
Module 1 Security Operations and Tooling/Lesson 1 The Modern Security Operations Center/004. 1.3 Describe SOC Roles and Responsibilities.en.srt 5.23 KB
Module 1 Security Operations and Tooling/Lesson 1 The Modern Security Operations Center/004. 1.3 Describe SOC Roles and Responsibilities.mp4 12.43 MB
Module 1 Security Operations and Tooling/Lesson 1 The Modern Security Operations Center/005. 1.4 Describe SOC Process Flow.en.srt 2.79 KB
Module 1 Security Operations and Tooling/Lesson 1 The Modern Security Operations Center/005. 1.4 Describe SOC Process Flow.mp4 7.09 MB
Module 1 Security Operations and Tooling/Lesson 2 Security Operations Concepts and Tooling/001. Learning objectives.en.srt 660 B
Module 1 Security Operations and Tooling/Lesson 2 Security Operations Concepts and Tooling/001. Learning objectives.mp4 4.71 MB
Module 1 Security Operations and Tooling/Lesson 2 Security Operations Concepts and Tooling/002. 2.1 Describe Basics of NIST Cybersecurity Framework (CSF).en.srt 4.39 KB
Module 1 Security Operations and Tooling/Lesson 2 Security Operations Concepts and Tooling/002. 2.1 Describe Basics of NIST Cybersecurity Framework (CSF).mp4 10.04 MB
Module 1 Security Operations and Tooling/Lesson 2 Security Operations Concepts and Tooling/003. 2.2 Describe Major Categories of Threats.en.srt 2.73 KB
Module 1 Security Operations and Tooling/Lesson 2 Security Operations Concepts and Tooling/003. 2.2 Describe Major Categories of Threats.mp4 8.8 MB
Module 1 Security Operations and Tooling/Lesson 2 Security Operations Concepts and Tooling/004. 2.3 Describe Major Categories of Controls.en.srt 3.82 KB
Module 1 Security Operations and Tooling/Lesson 2 Security Operations Concepts and Tooling/004. 2.3 Describe Major Categories of Controls.mp4 10.13 MB
Module 1 Security Operations and Tooling/Lesson 2 Security Operations Concepts and Tooling/005. 2.4 Identify Some Popular Open-Source Tools and Their Functions.en.srt 2.1 KB
Module 1 Security Operations and Tooling/Lesson 2 Security Operations Concepts and Tooling/005. 2.4 Identify Some Popular Open-Source Tools and Their Functions.mp4 5.07 MB
Module 1 Security Operations and Tooling/Lesson 3 Computer Security Incident Response Teams (CSIRT)/001. Learning objectives.en.srt 644 B
Module 1 Security Operations and Tooling/Lesson 3 Computer Security Incident Response Teams (CSIRT)/001. Learning objectives.mp4 4.44 MB
Module 1 Security Operations and Tooling/Lesson 3 Computer Security Incident Response Teams (CSIRT)/002. 3.1 Describe the Goals of a CSIRT.en.srt 1.75 KB
Module 1 Security Operations and Tooling/Lesson 3 Computer Security Incident Response Teams (CSIRT)/002. 3.1 Describe the Goals of a CSIRT.mp4 5.43 MB
Module 1 Security Operations and Tooling/Lesson 3 Computer Security Incident Response Teams (CSIRT)/003. 3.2 Appreciate the Differences Between a SOC and a CSIRT.en.srt 1.31 KB
Module 1 Security Operations and Tooling/Lesson 3 Computer Security Incident Response Teams (CSIRT)/003. 3.2 Appreciate the Differences Between a SOC and a CSIRT.mp4 4.18 MB
Module 2 Extended Detection and Response (XDR)/001. Module Introduction.en.srt 1.13 KB
Module 2 Extended Detection and Response (XDR)/001. Module Introduction.mp4 4.08 MB
Module 2 Extended Detection and Response (XDR)/Lesson 4 Trends and Challenges/001. Learning objectives.en.srt 476 B
Module 2 Extended Detection and Response (XDR)/Lesson 4 Trends and Challenges/001. Learning objectives.mp4 1.97 MB
Module 2 Extended Detection and Response (XDR)/Lesson 4 Trends and Challenges/002. 4.1 Describe the Limitations of Existing Solutions.en.srt 9.09 KB
Module 2 Extended Detection and Response (XDR)/Lesson 4 Trends and Challenges/002. 4.1 Describe the Limitations of Existing Solutions.mp4 16.56 MB
Module 2 Extended Detection and Response (XDR)/Lesson 4 Trends and Challenges/003. 4.2 Identify Some of the Top Roadblocks with Existing Tools.en.srt 6.67 KB
Module 2 Extended Detection and Response (XDR)/Lesson 4 Trends and Challenges/003. 4.2 Identify Some of the Top Roadblocks with Existing Tools.mp4 11.64 MB
Module 2 Extended Detection and Response (XDR)/Lesson 4 Trends and Challenges/004. 4.3 Describe the Limitations with SIEMs.en.srt 4.01 KB
Module 2 Extended Detection and Response (XDR)/Lesson 4 Trends and Challenges/004. 4.3 Describe the Limitations with SIEMs.mp4 7.16 MB
Module 2 Extended Detection and Response (XDR)/Lesson 4 Trends and Challenges/005. 4.4 Describe the Limitations with SOARs.en.srt 2.67 KB
Module 2 Extended Detection and Response (XDR)/Lesson 4 Trends and Challenges/005. 4.4 Describe the Limitations with SOARs.mp4 5 MB
Module 2 Extended Detection and Response (XDR)/Lesson 5 Introducing XDR/001. Learning objectives.en.srt 623 B
Module 2 Extended Detection and Response (XDR)/Lesson 5 Introducing XDR/001. Learning objectives.mp4 2.67 MB
Module 2 Extended Detection and Response (XDR)/Lesson 5 Introducing XDR/002. 5.1 Describe the Basics of XDR.en.srt 3.21 KB
Module 2 Extended Detection and Response (XDR)/Lesson 5 Introducing XDR/002. 5.1 Describe the Basics of XDR.mp4 6.55 MB
Module 2 Extended Detection and Response (XDR)/Lesson 5 Introducing XDR/003. 5.2 Describe the Goals of XDR.en.srt 1.97 KB
Module 2 Extended Detection and Response (XDR)/Lesson 5 Introducing XDR/003. 5.2 Describe the Goals of XDR.mp4 4.36 MB
Module 2 Extended Detection and Response (XDR)/Lesson 5 Introducing XDR/004. 5.3 Describe Cisco's Secure Approach to XDR.en.srt 2.87 KB
Module 2 Extended Detection and Response (XDR)/Lesson 5 Introducing XDR/004. 5.3 Describe Cisco's Secure Approach to XDR.mp4 6.2 MB
Module 2 Extended Detection and Response (XDR)/Lesson 5 Introducing XDR/005. 5.4 Identify the Components of XDR.en.srt 7.16 KB
Module 2 Extended Detection and Response (XDR)/Lesson 5 Introducing XDR/005. 5.4 Identify the Components of XDR.mp4 12.53 MB
Module 2 Extended Detection and Response (XDR)/Lesson 5 Introducing XDR/006. 5.5 Appreciate XDR's Differences from a SIEM and SOAR.en.srt 3.08 KB
Module 2 Extended Detection and Response (XDR)/Lesson 5 Introducing XDR/006. 5.5 Appreciate XDR's Differences from a SIEM and SOAR.mp4 6.22 MB
Module 2 Extended Detection and Response (XDR)/Lesson 5 Introducing XDR/007. 5.6 Describe XDR's Real-World Outcomes.en.srt 1.88 KB
Module 2 Extended Detection and Response (XDR)/Lesson 5 Introducing XDR/007. 5.6 Describe XDR's Real-World Outcomes.mp4 3.94 MB
Module 2 Extended Detection and Response (XDR)/Lesson 6 XDR's Integrated Security Stack/001. Learning objectives.en.srt 780 B
Module 2 Extended Detection and Response (XDR)/Lesson 6 XDR's Integrated Security Stack/001. Learning objectives.mp4 3.32 MB
Module 2 Extended Detection and Response (XDR)/Lesson 6 XDR's Integrated Security Stack/002. 6.1 Identify the Goals of an Integrated Security Stack.en.srt 1.87 KB
Module 2 Extended Detection and Response (XDR)/Lesson 6 XDR's Integrated Security Stack/002. 6.1 Identify the Goals of an Integrated Security Stack.mp4 4.42 MB
Module 2 Extended Detection and Response (XDR)/Lesson 6 XDR's Integrated Security Stack/003. 6.2 Appreciate XDR's Native and Third-Party Compatibility.en.srt 2.83 KB
Module 2 Extended Detection and Response (XDR)/Lesson 6 XDR's Integrated Security Stack/003. 6.2 Appreciate XDR's Native and Third-Party Compatibility.mp4 5.97 MB
Module 2 Extended Detection and Response (XDR)/Lesson 6 XDR's Integrated Security Stack/004. 6.3 Describe XDR's REST APIs.en.srt 2.25 KB
Module 2 Extended Detection and Response (XDR)/Lesson 6 XDR's Integrated Security Stack/004. 6.3 Describe XDR's REST APIs.mp4 6.48 MB
Module 2 Extended Detection and Response (XDR)/Lesson 6 XDR's Integrated Security Stack/005. 6.4 Describe XDR's Detection Analytics.en.srt 3.95 KB
Module 2 Extended Detection and Response (XDR)/Lesson 6 XDR's Integrated Security Stack/005. 6.4 Describe XDR's Detection Analytics.mp4 7.75 MB
Module 2 Extended Detection and Response (XDR)/Lesson 6 XDR's Integrated Security Stack/006. 6.5 Describe XDR's Remediation Capabilities.en.srt 3.33 KB
Module 2 Extended Detection and Response (XDR)/Lesson 6 XDR's Integrated Security Stack/006. 6.5 Describe XDR's Remediation Capabilities.mp4 6.51 MB
Module 2 Extended Detection and Response (XDR)/Lesson 6 XDR's Integrated Security Stack/007. 6.6 Describe XDR's OrchestrationAutomation Capabilities.en.srt 3.68 KB
Module 2 Extended Detection and Response (XDR)/Lesson 6 XDR's Integrated Security Stack/007. 6.6 Describe XDR's OrchestrationAutomation Capabilities.mp4 7.37 MB
Module 2 Extended Detection and Response (XDR)/Lesson 6 XDR's Integrated Security Stack/008. 6.7 Describe an Effective XDR Solution.en.srt 1.8 KB
Module 2 Extended Detection and Response (XDR)/Lesson 6 XDR's Integrated Security Stack/008. 6.7 Describe an Effective XDR Solution.mp4 3.64 MB
Module 3 XDR with Cisco/001. Module Introduction.en.srt 1.16 KB
Module 3 XDR with Cisco/001. Module Introduction.mp4 4.04 MB
Module 3 XDR with Cisco/Lesson 7 Threat Hunting/001. Learning objectives.en.srt 458 B
Module 3 XDR with Cisco/Lesson 7 Threat Hunting/001. Learning objectives.mp4 2 MB
Module 3 XDR with Cisco/Lesson 7 Threat Hunting/002. 7.1 Describe the PICERL Model.en.srt 2.87 KB
Module 3 XDR with Cisco/Lesson 7 Threat Hunting/002. 7.1 Describe the PICERL Model.mp4 5.23 MB
Module 3 XDR with Cisco/Lesson 7 Threat Hunting/003. 7.2 Describe the MITRE Framework.en.srt 1.52 KB
Module 3 XDR with Cisco/Lesson 7 Threat Hunting/003. 7.2 Describe the MITRE Framework.mp4 3.84 MB
Module 3 XDR with Cisco/Lesson 7 Threat Hunting/004. 7.3 Describe Adversary Tactics, Techniques, and Procedures (TTPs).en.srt 1.25 KB
Module 3 XDR with Cisco/Lesson 7 Threat Hunting/004. 7.3 Describe Adversary Tactics, Techniques, and Procedures (TTPs).mp4 3.42 MB
Module 3 XDR with Cisco/Lesson 7 Threat Hunting/005. 7.4 Identify the Tools and Techniques for Threat Hunting.en.srt 6.26 KB
Module 3 XDR with Cisco/Lesson 7 Threat Hunting/005. 7.4 Identify the Tools and Techniques for Threat Hunting.mp4 9.56 MB
Module 3 XDR with Cisco/Lesson 8 Investigating an Incident/001. Learning objectives.en.srt 837 B
Module 3 XDR with Cisco/Lesson 8 Investigating an Incident/001. Learning objectives.mp4 3.65 MB
Module 3 XDR with Cisco/Lesson 8 Investigating an Incident/002. 8.1 Describe an Incident in XDR.en.srt 36.91 KB
Introduction/001. Detection and Response with XDR Introduction.en.srt 5.43 KB
Module 3 XDR with Cisco/Lesson 8 Investigating an Incident/003. 8.2 Describe Incident Priority and MITRE Tactics.en.srt 12.99 KB
Module 3 XDR with Cisco/Lesson 8 Investigating an Incident/003. 8.2 Describe Incident Priority and MITRE Tactics.mp4 36.11 MB
Module 3 XDR with Cisco/Lesson 8 Investigating an Incident/004. 8.3 Identify the Components of an Incident.en.srt 19.29 KB
Module 3 XDR with Cisco/Lesson 8 Investigating an Incident/004. 8.3 Identify the Components of an Incident.mp4 32.58 MB
Module 3 XDR with Cisco/Lesson 8 Investigating an Incident/005. 8.4 Interact with Cisco XDR's Attack Graph.en.srt 6.48 KB
Module 3 XDR with Cisco/Lesson 8 Investigating an Incident/005. 8.4 Interact with Cisco XDR's Attack Graph.mp4 10.44 MB
Module 3 XDR with Cisco/Lesson 8 Investigating an Incident/006. 8.5 Identify Correlating Data Using XDR.en.srt 10.21 KB
Module 3 XDR with Cisco/Lesson 8 Investigating an Incident/006. 8.5 Identify Correlating Data Using XDR.mp4 16.09 MB
Module 3 XDR with Cisco/Lesson 9 Responding to an Incident/001. Learning objectives.en.srt 615 B
Module 3 XDR with Cisco/Lesson 9 Responding to an Incident/001. Learning objectives.mp4 2.96 MB
Module 3 XDR with Cisco/Lesson 9 Responding to an Incident/002. 9.1 Appreciate the Value of Cisco XDR Integrations for Response.en.srt 7.73 KB
Module 3 XDR with Cisco/Lesson 9 Responding to an Incident/002. 9.1 Appreciate the Value of Cisco XDR Integrations for Response.mp4 12.66 MB
Module 3 XDR with Cisco/Lesson 9 Responding to an Incident/003. 9.2 Describe How XDR Can Respond to an Incident.en.srt 9.28 KB
Module 3 XDR with Cisco/Lesson 9 Responding to an Incident/003. 9.2 Describe How XDR Can Respond to an Incident.mp4 30.09 MB
Module 3 XDR with Cisco/Lesson 9 Responding to an Incident/004. 9.3 Understand Incident Response Playbooks.en.srt 17.82 KB
Module 3 XDR with Cisco/Lesson 9 Responding to an Incident/004. 9.3 Understand Incident Response Playbooks.mp4 45.27 MB
Module 4 Security Automation/001. Module Introduction.en.srt 1.83 KB
Module 4 Security Automation/001. Module Introduction.mp4 8.06 MB
Module 4 Security Automation/Lesson 10 What Is Security Automation/001. Learning objectives.en.srt 751 B
Module 4 Security Automation/Lesson 10 What Is Security Automation/001. Learning objectives.mp4 3.14 MB
Module 4 Security Automation/Lesson 10 What Is Security Automation/002. 10.1 Describe the Advantages of Security Automation.en.srt 18.44 KB
Module 4 Security Automation/Lesson 10 What Is Security Automation/002. 10.1 Describe the Advantages of Security Automation.mp4 31.98 MB
Module 4 Security Automation/Lesson 10 What Is Security Automation/003. 10.2 Describe the Roles of AI and Machine Learning.en.srt 13.73 KB
Module 4 Security Automation/Lesson 10 What Is Security Automation/003. 10.2 Describe the Roles of AI and Machine Learning.mp4 38.08 MB
Module 4 Security Automation/Lesson 11 How Does Automation Fit into XDR/001. Learning objectives.en.srt 781 B
Module 4 Security Automation/Lesson 11 How Does Automation Fit into XDR/001. Learning objectives.mp4 3.61 MB
Module 4 Security Automation/Lesson 11 How Does Automation Fit into XDR/002. 11.1 Understand Threat Hunting and Alert Investigation.en.srt 18.54 KB
Module 4 Security Automation/Lesson 11 How Does Automation Fit into XDR/002. 11.1 Understand Threat Hunting and Alert Investigation.mp4 31.81 MB
Module 4 Security Automation/Lesson 11 How Does Automation Fit into XDR/003. 11.2 Describe Response Actions.en.srt 23.12 KB
Module 4 Security Automation/Lesson 11 How Does Automation Fit into XDR/003. 11.2 Describe Response Actions.mp4 40 MB
Module 4 Security Automation/Lesson 12 Cisco XDR Automation/001. Learning objectives.en.srt 1.12 KB
Module 4 Security Automation/Lesson 12 Cisco XDR Automation/001. Learning objectives.mp4 4.97 MB
Module 4 Security Automation/Lesson 12 Cisco XDR Automation/002. 12.1 Describe XDR Automation and Its Usage.en.srt 18.84 KB
Module 4 Security Automation/Lesson 12 Cisco XDR Automation/002. 12.1 Describe XDR Automation and Its Usage.mp4 30.46 MB
Module 4 Security Automation/Lesson 12 Cisco XDR Automation/003. 12.2 Explain Automation Components.en.srt 25.78 KB
Module 4 Security Automation/Lesson 12 Cisco XDR Automation/003. 12.2 Explain Automation Components.mp4 45.81 MB
Module 4 Security Automation/Lesson 12 Cisco XDR Automation/004. 12.3 Explore the Workflow Editor.en.srt 37.44 KB
Module 4 Security Automation/Lesson 12 Cisco XDR Automation/004. 12.3 Explore the Workflow Editor.mp4 54.38 MB
Module 4 Security Automation/Lesson 12 Cisco XDR Automation/005. 12.4 Explain a Workflow Run and Troubleshooting.en.srt 16.72 KB
Module 4 Security Automation/Lesson 12 Cisco XDR Automation/005. 12.4 Explain a Workflow Run and Troubleshooting.mp4 28.13 MB
Summary/001. Detection and Response with XDR Summary.en.srt 701 B
Summary/001. Detection and Response with XDR Summary.mp4 2.49 MB
Download Info
-
Tips
“Detection and Response with XDR Integrated Security Solutions to Combat Emerging Threats” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.