Header Fragment
Logo

A career growth machine

Home All Students Certifications Training Interview Plans Contact Us
  
× Login Plans Home All Students
AI Resume & Interview
Certifications Training
Books
Interview Contact Us
FAQ

Unlimited Learning, One Price
$299 / INR 23,999

All Content for $99 / INR 7,999

Offer valid for the next 3 days.

Subscribe

Chapter 1: Security Operations Fundamentals-Explain the function of users, roles, log management, compliance, and data protection in Cortex XDR
Chapter 2: Security Operations Fundamentals-Explain the process of creating and managing reports and dashboards in Cortex products
Chapter 3: Security Operations Fundamentals-Explain the common components and functions of a Security Operations Center (SOC)-Roles and responsibilities
Chapter 4: Security Operations Fundamentals-Explain the common components and functions of a Security Operations Center (SOC)-Tools, technologies, and analytics
Chapter 7: Threat Intelligence and Incident Response-Explain the concept of incident management and response
Chapter 10: Threat Intelligence and Incident Response-Explain how le, IP address, domain, and URL indicator types are used in Cortex products
Chapter 11: Threat Intelligence and Incident Response-Compare and contrast WildFire, Unit 42 intelligence, and VirusTotal
Chapter 12: Threat Intelligence and Incident Response-Evaluate false positive, false negative, and true positive security incidents
Chapter 13: Threat Intelligence and Incident Response-Conduct basic threat hunting based on a common indicator types
Chapter 14: Cortex XDR-Identify and explain the use of key Cortex XDR elements-Sensors
Chapter 18: Cortex XDR-Identify and explain the use of key Cortex XDR elements-Detection and response
Chapter 20: Cortex XDR-Identify and explain the use of key Cortex XDR elements-Data sources, users, artifacts, and assets in investigations
Chapter 25: Cortex XSOAR-Explain the features and functionality of Cortex XSOAR-Third-party system integration
Chapter 26: Cortex XSOAR-Explain the features and functionality of Cortex XSOAR-Indicators and feeds in Threat Intelligence Management
Chapter 30: Cortex XSIAM-Explain the function of key Cortex XSIAM components-Sensors
Chapter 31: Cortex XSIAM-Explain the function of key Cortex XSIAM components-Log Stitching
Chapter 37: Cortex XSIAM-Explain Cortex XSIAM processes, capabilities, use cases, and rules-Key investigation artifacts and assets
Chapter 38: Cortex XSIAM-Explain Cortex XSIAM processes, capabilities, use cases, and rules-Threat management, detection, and response
Chapter 39: Cortex XSIAM-Explain Cortex XSIAM processes, capabilities, use cases, and rules-Threat hunting and investigation searches and queries

Combo Packages at a Discount: Get one that best fits your learning needs.