Skip to content

Details

  • Three methods of threat detection.
  • Detecting threats using prebuilt attack rules.
  • Investigating cyberattacks with attack timelines using event correlation.
  • What is the MITRE ATT&CK framework.
  • Formulating a threat-informed defense using the MITRE ATT&CK framework.
  • How machine learning can help detect behavior-based security threats.
  • Spotting anomalous activities using user and entity behavior analytics.

Members are also interested in