Security Operations and Monitoring
Analyze data as part of security monitoring activities – Part100:36:46
Analyze data as part of security monitoring activities – Part200:38:15
Analyze data as part of security monitoring activities – Part300:28:08
Implement configuration changes to existing controls to improve security.00:36:34
Explain the importance of proactive threat hunting.00:33:06
Compare and contrast automation concepts and technologies – Part100:32:48
Compare and contrast automation concepts and technologies – Part200:32:48