|
11 - Security Management: Threat Detection Management II
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
15 |
|
|
10 - Security Management: Threat Detection Management I
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
25 |
|
|
9 - Attack Surface Insights: Devices
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
8 - Attack Surface Insights: Users
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
7 - Context Management II
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
15 |
|
|
6 - Context Management I
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
5 - Log Stream: Enrichment
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
4 - Log Stream: Parsers II
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
15 |
|
|
3 - Log Stream: Parsers I
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
2 - Collection
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
1 - Platform Overview: Start Here!
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
5 |
|