Back to all modules

Security Operations & Monitoring

Learn how to configure and utilise tooling to ensure that suspicious activity is quickly identified and dealt within your environment.

Defenders use a variety of tools that make up the security stack such as Security Information and Event Management (SIEM) and Endpoint Detection and Response (EDR) tools. Defenders need to know how to configure these tools properly and utilise them to gain visibility and identify anomalous activity in their network. This module will explore these different tools used to monitor and detect threats on the network and endpoints.

Loading...

Loading rooms...

Need to know
Next Steps

What are modules?

A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).

Learning Structure Diagram