The map, the map!!
|
8: Outcomes Navigator |
20 |
|
The map, the map!
|
8: Outcomes Navigator |
20 |
|
Sea of Threats! 2
|
9: Threat Center |
20 |
|
Sea of Threats! 1
|
9: Threat Center |
20 |
|
Posterize your Posture
|
8: Outcomes Navigator |
16 |
|
Improving the foundations
|
8: Outcomes Navigator |
12 |
|
Can you hear me now?
|
8: Outcomes Navigator |
14 |
|
Updates
|
2: Log Stream |
10 |
|
Up to date
|
2: Log Stream |
12 |
|
Parser Details II
|
2: Log Stream |
11 |
|
Parser Details I
|
2: Log Stream |
10 |
|
Let's do it Live! III
|
2: Log Stream |
12 |
|
Let's do it Live! II
|
2: Log Stream |
20 |
|
Let's do it Live! I
|
2: Log Stream |
12 |
|
Introducing Log Stream
|
2: Log Stream |
10 |
|
Creating Parsers
|
2: Log Stream |
10 |
|
Calibration Station
|
2: Log Stream |
10 |
|
Calibration Required
|
2: Log Stream |
10 |
|
All Aboard!
|
2: Log Stream |
12 |
|
You've got mail!
|
1: Exabeam Security Operations Platform - Navigation Basics |
7 |
|
The never-ending debate....
|
1: Exabeam Security Operations Platform - Navigation Basics |
10 |
|
Navigation Basics 3
|
1: Exabeam Security Operations Platform - Navigation Basics |
10 |
|
Navigation Basics 2
|
1: Exabeam Security Operations Platform - Navigation Basics |
10 |
|
Navigation Basics 1
|
1: Exabeam Security Operations Platform - Navigation Basics |
10 |
|
6 - Threat Detection Incident Response: Automation Management I
|
12: New-Scale Analytics CTF |
20 |
|
20 - Platform Insights: Outcomes Navigator II
|
12: New-Scale Analytics CTF |
10 |
|
19 - Platform Insights: Outcomes Navigator I
|
12: New-Scale Analytics CTF |
30 |
|
18 - Threat Detection Incident Response: Search Natural Language II
|
12: New-Scale Analytics CTF |
30 |
|
17 - Threat Detection Incident Response: Search Natural Language I
|
12: New-Scale Analytics CTF |
40 |
|
16 - Threat Detection Incident Response: Search Basic
|
12: New-Scale Analytics CTF |
40 |
|
15 - Threat Detection Incident Response: Search Timeline II
|
12: New-Scale Analytics CTF |
25 |
|
14 - Threat Detection Incident Response: Search Timeline I
|
12: New-Scale Analytics CTF |
25 |
|
13 - Threat Detection Incident Response: Threat Center VI
|
12: New-Scale Analytics CTF |
15 |
|
12 - Threat Detection Incident Response: Threat Center V
|
12: New-Scale Analytics CTF |
20 |
|
11 - Threat Detection Incident Response: Threat Center IV
|
12: New-Scale Analytics CTF |
15 |
|
10 - Threat Detection Incident Response: Threat Center III
|
12: New-Scale Analytics CTF |
15 |
|
9 - Threat Detection Incident Response: Threat Center II
|
12: New-Scale Analytics CTF |
15 |
|
8 - Threat Detection Incident Response: Threat Center I
|
12: New-Scale Analytics CTF |
10 |
|
7 - Threat Detection Incident Response: Automation Management II
|
12: New-Scale Analytics CTF |
15 |
|
5 - Security Management: Threat Detection Management II
|
12: New-Scale Analytics CTF |
25 |
|
4 - Security Management: Threat Detection Management I
|
12: New-Scale Analytics CTF |
25 |
|
3 - Security Management: Attack Surface Insights II
|
12: New-Scale Analytics CTF |
10 |
|
2 - Security Management: Attack Surface Insights I
|
12: New-Scale Analytics CTF |
10 |
|
1 - Platform Overview: Start Here!
|
12: New-Scale Analytics CTF |
5 |
|