Description
In this course, you will :
- First, you will learn how the security analyst fits into the overall cybersecurity posture of an organization.
- Next, you will discover the technologies and methodologies covered in the security event triage path.
- Finally, you will map the knowledge, skills, and abilities taught in each of the security event triage courses to the MITRE ATT&CK techniques that comprise the chain of compromise used by the simulated threat actors.