Course Outline

Introduction

  • Overview of Cortex XDR for government
  • Understanding the components of Cortex XDR for government

Getting Started with Cortex XDR for Government

  • Setting up Cortex XDR for government operations
  • Navigating the Cortex XDR management console for government use
  • Configuring policy rules and profiles for government agencies

Working with the Cortex Apps for Government

  • Overview of the Cortex apps designed for government needs
  • Activating the Cortex XDR lab environment for government testing

Malware Protection for Government

  • Overview of malware profiles and restrictions for government systems
  • Configuring and utilizing malware protection modules for government security

Exploit Protection for Government

  • Preventing application exploits in government networks
  • Understanding exploitation techniques and defense mechanisms for government IT environments
  • Using exploit protection modules and profiles for enhanced government security

Exceptions and Response Actions for Government

  • Understanding exceptions in the context of government operations
  • Tuning policies using exceptions to meet government requirements
  • Working with response actions for effective incident management in government settings

Behavioral Threat Analysis for Government

  • Understanding detection and response use cases specific to government agencies
  • Analyzing behavioral threats within the government sector
  • Leveraging an analytics engine for enhanced threat detection in government systems

Incident Management for Government

  • Using alerts to identify and respond to security incidents in government agencies
  • Handling incidents efficiently in a government context
  • Managing external alerts and integrating them into government processes
  • Configuring alert exclusion and policies for streamlined incident response in government settings

Troubleshooting for Government

  • Methodologies and resources for troubleshooting Cortex XDR issues in government environments
  • Utilizing troubleshooting tools to resolve technical challenges in government IT systems

Summary and Next Steps for Government

Requirements

  • Understanding of enterprise security principles

Target Audience for Government

  • Security professionals
  • Cybersecurity analysts
  • Administrators
 21 Hours

Number of participants


Price per participant

Upcoming Courses

Related Categories