This module provides an overview of security detections and their anatomy, and how they can be used to investigate interesting behaviors in your environment.
By the end of this module, you will be able to:
Identify key features of security detections
Explain each phase of the attack chain
Interpret risk scores
Your cart is empty