|
All Aboard!
|
2: Log Stream |
12 |
|
|
Sea of Threats! 2
|
1.1: Threat Center |
20 |
|
|
Sea of Threats! 1
|
1.1: Threat Center |
20 |
|
|
15 - Security Management: Threat Detection Management VI
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
14 - Security Management: Threat Detection Management V
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
Service please
|
3.5: Investigation 101 - Using Search |
15 |
|
|
Attribution is a b*tch
|
3.5: Investigation 101 - Using Search |
15 |
|
|
36 - Threat Detection Incident Response: Threat Center X
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
35 - Threat Detection Incident Response: Threat Center IX
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
34 - Threat Detection Incident Response: Threat Center VIII
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
33 - Threat Detection Incident Response: Threat Center VII
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
32 - Platform Insights: Outcomes Navigator III
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
15 |
|
|
31 - Platform Insights: Outcomes Navigator II
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
30 - Platform Insights: Outcomes Navigator I
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
15 |
|
|
29 - Threat Detection Incident Response: Automation Management III
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
15 |
|
|
28 - Threat Detection Incident Response: Automation Management II
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
15 |
|
|
27 - Threat Detection Incident Response: Automation Management I
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
20 |
|
|
26 - Threat Detection Incident Response: Search Natural Language II
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
30 |
|
|
25 - Threat Detection Incident Response: Search Natural Language I
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
40 |
|
|
24 - Threat Detection Incident Response: Search Basic
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
35 |
|
|
23 - Threat Detection Incident Response: Search Timeline II
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
20 |
|
|
22 - Threat Detection Incident Response: Search Timeline I
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
25 |
|
|
21 - Threat Detection Incident Response: Threat Center VI
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
20 - Threat Detection Incident Response: Threat Center V
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
15 |
|
|
19 - Threat Detection Incident Response: Threat Center IV
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
18 - Threat Detection Incident Response: Threat Center III
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
15 |
|
|
17 - Threat Detection Incident Response: Threat Center II
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
15 |
|
|
16 - Threat Detection Incident Response: Threat Center I
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
13 - Security Management: Threat Detection Management IV
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
20 |
|
|
12 - Security Management: Threat Detection Management III
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
25 |
|
|
11 - Security Management: Threat Detection Management II
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
15 |
|
|
10 - Security Management: Threat Detection Management I
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
25 |
|
|
9 - Attack Surface Insights: Devices
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
8 - Attack Surface Insights: Users
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
7 - Context Management II
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
15 |
|
|
6 - Context Management I
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
5 - Log Stream: Enrichment
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
4 - Log Stream: Parsers II
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
15 |
|
|
3 - Log Stream: Parsers I
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
2 - Collection
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
1 - Platform Overview: Start Here!
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
5 |
|