Abstract

Note: This course was previously titled Detect Suspicious Process, File, and Network Activity with CSM Threats.

Learning Objectives

After completing this course you will be able to:

  • Monitor process, network, kernel-level, and file activity using Workload Protection
  • Detect threat activity using Security Agent expressions and detection rules
  • Use Workload Protection security signals to investigate threats

Primary Audience

Security engineers, platform engineers, and cloud engineers responsible for securing workloads.

Prerequisites

The prerequisites for this course are the following:

Technical Requirements

In order to complete the course, you will need the following:

  • Google Chrome or Firefox

Course Navigation

At the bottom of each lesson, click the MARK LESSON COMPLETE AND CONTINUE button so that you are marked complete for each lesson and can receive the certificate at the end of the course.

Course Enrollment Period

Please note that your enrollment in this course ends after 30 days. You can re-enroll at any time and pick up where you left off.

Course curriculum

    1. Introduction

    1. Detect Threats with Workload Protection

    2. Investigate Threats with Workload Protection

    1. Lab Overview

    2. Lab: Detect Suspicious Activity with Workload Protection

    1. Summary and Resources

    2. Feedback Survey

Detect Host and Container Compromises with Workload Protection

  • 1 hours to complete
  • Intermediate