Course Description
This course is designed to enable you to:
• Describe how endpoint agents, XDR collectors, NGFWs, and Broker VMs secure networks and devices.
• Query and analyze logs using XQL for data ingestion and detection.
• Configure Threat Intel Management features, automate workflows, and apply EDLs and indicator rules.
Speciality
Not Applicable
Logon if you already have an account using the available login option