Reveal(x) Detection Workflow

2 modules


Russell Powers

19 Oct 2018


This course will show you how to investigate a data exfiltration detection using the Reveal(x) platform for Network Traffic Analysis for the enterprise. You'll learn how to go from detecting data exfiltration to examining the behaviors of a suspicious endpoint, right down to accessing the specific packets that were exfiltrated in just a few minutes. To try out this workflow and many others, visit our live online demo environment.

Detection Workflow
{{ vm.helper.t('reports.module') }}
Detection Workflow - Question 1
{{ vm.helper.t('courses.exam') }}
Added 2 days ago, by Tom
Added 3 days ago, by BHupender
Added 29 days ago, by Gerry
Added about 1 month ago, by Augusta
Added about 1 month ago, by Todd
Added about 1 month ago, by Karmanc
Added about 2 months ago, by Stephen
Added 2 months ago, by Shannon
Added 3 months ago, by Matt
Added 3 months ago, by Jitesh

Shopping Cart

Your cart is empty