Back to all modules

Security Operations & Monitoring

Security Operations & Monitoring icon

Learn how to configure and utilise tooling to ensure that suspicious activity is quickly identified and dealt within your environment.

Defenders use a variety of tools that make up the security stack such as Security Information and Event Management (SIEM) and Endpoint Detection and Response (EDR) tools. Defenders need to know how to configure these tools properly and utilise them to gain visibility and identify anomalous activity in their network. This module will explore these different tools used to monitor and detect threats on the network and endpoints.

Security Operations & Monitoring icon

We use cookies to ensure you get the best user experience. For more information contact us.

Read more