Abstract

NOTE: This course was previously titled Enable and Manage CSM Threats.

Learning Objectives

By the end of this course, you'll be able to do the following:

  • Enable Workload Protection and configure the Datadog Agent for threat monitoring on hosts and containers
  • Manage Security Agent rules and Workload Protection detection rules 
  • Understand the Workload Protection rules pipeline
  • Use Security Agent rules and detection rules to generate Workload Protection security signals


Primary Audience

This course is designed for: 

security engineers, platform engineers, and cloud engineers responsible for security monitoring in a public cloud environment. 

Prerequisites

The prerequisites for this course are the following:

  • Recommended: Completion of the Learning Environment course
  • Basic cloud computing knowledge (this course features a sandbox AWS environment)
  • Basic familiarity with the Linux command line

Technical Requirements

To complete the course, you will need the following:

  • Google Chrome or Firefox

Course Navigation

At the bottom of each lesson, click the MARK LESSON COMPLETE AND CONTINUE button so that you are marked complete for each lesson and can receive the certificate at the end of the course.

Course Enrollment Period

Please note that your enrollment in this course ends after 30 days. You can re-enroll at any time and pick up where you left off.

Course curriculum

    1. Introduction

    1. Get Started with Workload Protection

    2. Security Agent Rules

    3. Detection Rules and Security Signals

    1. Lab Overview

    2. Lab: Enable and Manage Workload Protection

    1. Summary and Resources

    2. Feedback Survey

Enable and Manage Workload Protection

  • 1 hours to complete
  • Beginner