What is Detect and Respond Network and Compliance 00:03:11
Explains the value of Detect and Respond Network Compliance and describes how the Continuum SOC leverages the SIEM (Security Information and and Event Management System) to analyze environments.
SIEM and the Security Landscape 00:01:44
Explains Security Information and Event Management, or SIEM, and describes how it is used within a network.
Your Guide to a Successful Evaluation 00:02:52
Highlights the methodology and steps required to complete a successful Detect and Respond Network and Compliance evaluation.
EventTracker Site Architecture and Installation 00:04:30
Reviews a site’s network architecture and requirements for sensor agent installation, identifying where the sensor should be installed and additional configurations.
Create Console Users 00:01:50
Explains how to create user accounts for your team once you receive access to the EventTracker console.
Understanding Alerts 00:03:41
Defines the four categories of alerts generated by Detect and Respond Network and Compliance and the explains the actions required when specific alerts are generated.
Escalating Alerts 00:01:17
Describes how to modify your daily workflows to include a review of all active alerts, identifying alerts that require investigation, are pending investigation, and require escalation to Continuum’s SOC.
Cybersecurity Management for Network Security
Provides the framework to help your clients demonstrate regulatory compliance.
Compliance and regulatory requirements continue to drive security in today’s competitive landscape. MSP customers must have the proper tools and practices in place to meet standards. The Fortify for Network Security course provides the framework to help your clients demonstrate compliance.
- Explains how to leverage the SOC to collect, analyze, and correlate information to identify incidents.
- Defines how the SOC acts to mitigate attacks while providing advanced remediation and next steps.
- Shows the value of security information and event management (SIEM) to collect and analyze threats in real-time environments.
- Describes how to initiate setup and Event Tracker training.
Completion of this course is required to evaluate Cybersecurity Management for Network Security.