Threat detection by leveraging rules, signature, and machine learning.
Details
- Three methods of threat detection.
- Detecting threats using prebuilt attack rules.
- Investigating cyberattacks with attack timelines using event correlation.
- What is the MITRE ATT&CK framework.
- Formulating a threat-informed defense using the MITRE ATT&CK framework.
- How machine learning can help detect behavior-based security threats.
- Spotting anomalous activities using user and entity behavior analytics.
