Module 6: Incident Detection and Identification
Passive Incident Alerting
Using Alerts as a Starting Point
How to Correlate Alerts
Active Incident Discovery
Threat Hunting
Third-Party Sources
Identifying False Positives
Understanding the Impact of False Positives
Understanding Incident vs Event
False Positive Case Studies
Automating Away False Positives
Identifying Attack Chains
Identifying Single-Host Compromise
Identifying a Full Compromise
Last updated