Completed
Introduction
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
How Threat Intelligence Sharing and Automation Wins the War against Attackers
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Security Automation Market
- 3 Threat Detection Automation
- 4 Vulnerability Scanner Data
- 5 Automating Vulnerability Prioritization
- 6 Asset Management Database
- 7 Set the Rules
- 8 Scan Data
- 9 Deploy Patch
- 10 Automation Workflow
- 11 Security Incident Response
- 12 Research and Automation
- 13 High Profile Vulnerability Planning
- 14 Vulnerability Scanner
- 15 Shellshock Example
- 16 Security Analyst Workflow
- 17 Data Enrichment Activities
- 18 Phishing Attacks
- 19 Phishing Attack Example
- 20 More Automation
- 21 Threat Intel Sharing
- 22 Operationalizing Threat Intel
- 23 Duplicative Information
- 24 Is it real
- 25 Circle of Trust
- 26 Anonymous
- 27 Timely
- 28 Automation
- 29 Prioritize vulnerability patching
- 30 Hiring talent
- 31 Questions