Header Fragment
Logo

A career growth machine

Home All Students Certifications Training Interview Plans Contact Us
  
× Login Plans Home All Students
AI Resume & Interview
Certifications Training
Books
Interview Contact Us
FAQ

Unlimited Learning, One Price
$299 / INR 23,999

All Content for $99 / INR 7,999

Offer valid for the next 3 days.

Subscribe

Chapter 2: Alerting and Detection Processes-Explain alert prioritization handling-Incident scoring
Chapter 4: Alerting and Detection Processes-Explain alert prioritization handling-Featured elds
Chapter 8: Alerting and Detection Processes-Identify and describe alert sources and corresponding actions-XDR Agent
Chapter 9: Alerting and Detection Processes-Identify and describe alert sources and corresponding actions-XDR behavioral indicator of compromise (BIOC)
Chapter 12: Incident Handling and Response-Review and investigate alert evidence-Forensics
Chapter 16: Incident Handling and Response-Identify, analyze, and respond to security events and incidents
Chapter 18: Incident Handling and Response-Identify, hunt, and investigate leads and IOCs
Chapter 20: Incident Handling and Response-Dierentiate between alert grouping and data stitching
Chapter 21: Automation and Playbooks-Use playbooks for automated incident response
Chapter 22: Automation and Playbooks-Identify and describe playbook components-Task types
Chapter 23: Automation and Playbooks-Identify and describe playbook components-Sub-playbooks
Chapter 24: Automation and Playbooks-Identify and describe playbook components-Error handling
Chapter 28: Data Analysis with XQL-Use XQL to query datasets
Chapter 29: Data Analysis with XQL-Explain XQL data structure-Syntax
Chapter 31: Data Analysis with XQL-Explain XQL data structure-Data sources
Chapter 32: Data Analysis with XQL-Identify and describe XQL options-Query Library
Chapter 33: Data Analysis with XQL-Identify and describe XQL options-XQL Helper
Chapter 34: Data Analysis with XQL-Identify and describe XQL options-Scheduled queries
Chapter 39: Endpoint Security Management-Respond to endpoint alerts and incidents-Endpoint isolation
Chapter 40: Endpoint Security Management-Respond to endpoint alerts and incidents-Malware scan
Chapter 43: Threat Intelligence Management and ASM -Validate artifacts, verdicts, reputations, and impact
Chapter 44: Threat Intelligence Management and ASM -Explain the process of creating prevention and detection indicator rules
Chapter 48: Threat Intelligence Management and ASM -Use the attack surface threat response center to identify, review, assess, research,and remediate emerging threats

Combo Packages at a Discount: Get one that best fits your learning needs.