|
19 - Threat Detection Incident Response: Threat Center IV
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
18 - Threat Detection Incident Response: Threat Center III
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
15 |
|
|
17 - Threat Detection Incident Response: Threat Center II
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
15 |
|
|
16 - Threat Detection Incident Response: Threat Center I
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
15 - Security Management: Threat Detection Management VI
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
14 - Security Management: Threat Detection Management V
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
13 - Security Management: Threat Detection Management IV
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
20 |
|
|
12 - Security Management: Threat Detection Management III
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
25 |
|
|
11 - Security Management: Threat Detection Management II
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
15 |
|
|
10 - Security Management: Threat Detection Management I
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
25 |
|
|
9 - Attack Surface Insights: Devices
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
8 - Attack Surface Insights: Users
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
7 - Context Management II
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
15 |
|
|
6 - Context Management I
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
5 - Log Stream: Enrichment
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
4 - Log Stream: Parsers II
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
15 |
|
|
3 - Log Stream: Parsers I
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
2 - Collection
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
1 - Platform Overview: Start Here!
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
5 |
|