Skip to content

Threat detection by leveraging rules, signature, and machine learning.

Photo of IT users and ManageEngine
Hosted By
IT users and M.
Threat detection by leveraging rules, signature, and machine learning.

Details

  • Three methods of threat detection.
  • Detecting threats using prebuilt attack rules.
  • Investigating cyberattacks with attack timelines using event correlation.
  • What is the MITRE ATT&CK framework.
  • Formulating a threat-informed defense using the MITRE ATT&CK framework.
  • How machine learning can help detect behavior-based security threats.
  • Spotting anomalous activities using user and entity behavior analytics.
Photo of ManageEngine's Cybersecurity Meetups group
ManageEngine's Cybersecurity Meetups
See more events