Video description
6+ Hours of Video Instruction
Stay ahead of evolving security threats by mastering eXtended Detection and Response (XDR)
Modern security operations face a rapidly evolving threat landscape, making it difficult to gain complete visibility across disparate security tools. Detection and Response with XDR: Integrated Security Solutions to Combat Emerging Threats introduces learners to how XDR can bridge that gap by centralizing telemetry, intelligence, and response capabilities from a variety of sources into a single platform.
In this comprehensive video course, you’ll discover why XDR is a game-changer in reducing detection and response times, explore how XDR optimizes security operations, and learn practical strategies to implement XDR in your organization. This course provides the necessary skills to design, implement, and automate threat responses using cutting-edge XDR technology.
About the Instructors
Steven (Steve) McNutt, CCIE #6495 (Enterprise Infrastructure, Security), M.S. Cybersecurity, and DevNet Professional is a Cybersecurity Technical Solutions Architect for Cisco. He’s presented on XDR Orchestration at Cisco Live multiple times. Steve is a member of the Security Programmability Team (SPOT), which develops and delivers training content around Security Programmability. Steve has been in the Information Technology business since 1995 in various roles, including individual contributor, management, and business founder/owner.
Katherine McNamara, CCIE No. 50931, is a Cybersecurity Technical Solutions Architect at Cisco Systems and has worked with large enterprise and public sector customers. Katherine joined Cisco in 2014 and has worked in IT since 2007 in multiple networking and security roles. She graduated with a Bachelor of Science in IT Security and a Master of Science in Information Security and Assurance. Her many certifications include CCIE Data Center, CCIE Security, MCSE, VCP, CISSP, CCNP, CCDP, and more.
Outside of her day job, she runs a blog called network-node.com, which provides training articles and videos about Cisco Security products. She also helps co-organize the largest Cisco study Meetup group in the world named Routergods.
Matt Vander Horst is a Technical Leader in Cisco’s Security Business Group focused on Cisco XDR. He’s a subject matter expert for XDR automation and is responsible for helping Cisco engineers, customers, and partners get the most value out of XDR. Matt has hosted a multitude of webinars and deep dives about XDR, has presented about XDR at conferences around the globe, and currently manages the automation content built into XDR and the XDR Automation Exchange. Prior to joining Cisco in early 2020, Matt spent eight years managing a Cisco Identity Services Engine (ISE) deployment and network infrastructure automation for a large international financial organization. His background includes network engineering, system administration, software development, and DevOps.
Skill Level
- Beginner
- Intermediate
Learn How To
- Identify modern cybersecurity threats and vulnerabilities
- Understand how XDR enhances visibility across products and technologies
- Utilize XDR’s investigation features to detect and manage breaches
- Leverage automation to isolate and remediate threats swiftly
Prerequisites
- Basic understanding of cybersecurity concepts
- Familiarity with SOC tools such as SIEM, IDS/IPS, and firewalls
- Experience in a security operations role (for example, security analyst or incident responder)
Who Should Take This Course
Job titles:
- SOC Analyst
- Incident Responder
- Security Engineer
- Security Operations Manager
- Security Architect
- CISO (Chief Information Security Officer)
- Network Security Engineer
- Threat Hunter
- Penetration Tester
- Security Automation Specialist
- IT Manager with Security Focus
About Pearson Video Training
Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
Table of contents
- Introduction
- Module 1: Security Operations and Tooling
- Lesson 1: The Modern Security Operations Center
- Lesson 2: Security Operations Concepts and Tooling
- Lesson 3: Computer Security Incident Response Teams (CSIRT)
- Module 2: Extended Detection and Response (XDR)
- Lesson 4: Trends and Challenges
- Lesson 5: Introducing XDR
-
Lesson 6: XDR's Integrated Security Stack
- Learning objectives
- 6.1 Identify the Goals of an Integrated Security Stack
- 6.2 Appreciate XDR's Native and Third-Party Compatibility
- 6.3 Describe XDR's REST APIs
- 6.4 Describe XDR's Detection Analytics
- 6.5 Describe XDR's Remediation Capabilities
- 6.6 Describe XDR's Orchestration/Automation Capabilities
- 6.7 Describe an Effective XDR Solution
- Module 3: XDR with Cisco
- Lesson 7: Threat Hunting
- Lesson 8: Investigating an Incident
- Lesson 9: Responding to an Incident
- Module 4: Security Automation
- Lesson 10: What Is Security Automation?
- Lesson 11: How Does Automation Fit into XDR?
- Lesson 12: Cisco XDR Automation
- Summary
Product information
- Title: Detection and Response with XDR: Integrated Security Solutions to Combat Emerging Threats
- Author(s):
- Release date: November 2024
- Publisher(s): Cisco Press
- ISBN: 0135345642
You might also like
article
From ChatGPT to HackGPT: Meeting the Cybersecurity Threat of Generative AI
Emerging generative AI technologies such as ChatGPT are putting new tools in the hands of hackers. …
article
Have ChatGPT Ask You Questions
ChatGPT Shortcuts shows future prompt engineers how to harness the full potential of the state-of-the-art AI …
article
Use GitHub Copilot: Additional Tips
Using GitHub Copilot can feel like magic. The tool automatically fills out entire blocks of code--but …
article
Why the Power of Technology Rarely Goes to the People
Throughout history, the advantages and costs of technological innovations have been unevenly distributed between the powerful …