Threat detection by leveraging rules, signature, and machine learning.
Details
- Three methods of threat detection.
 - Detecting threats using prebuilt attack rules.
 - Investigating cyberattacks with attack timelines using event correlation.
 - What is the MITRE ATT&CK framework.
 - Formulating a threat-informed defense using the MITRE ATT&CK framework.
 - How machine learning can help detect behavior-based security threats.
 - Spotting anomalous activities using user and entity behavior analytics.
 
