Back to Course
Security Orchestration, Automation & Response (SOAR)
0% Complete
0/43 Steps
-
SOAR Playbooks27 Topics
-
Communication with a Known Bad
-
Denial of Service
-
Denial of Service
-
False Positive
-
Improper Disposal of Confidential Documents
-
Improper Disposal of Digital Asset
-
IR Playbook - Suspected Insider Threat
-
IR Playbook - Suspected System Intrusion
-
IR Playbook - Third Party Breach
-
Lost / Stolen Laptop
-
Lost or Stolen Smart Device
-
Lost or Stolen Storage Device
-
Malicious Code
-
Malware
-
Malware Detected on Endpoint
-
Peer-2-Peer File Sharing
-
Phishing
-
Port Scan Activity
-
Privileged Account Creation
-
Social Engineering
-
Suspected Data Breach
-
Suspected Phishing
-
Suspicious Network Activity
-
Suspicious System Activity
-
System Probes & Scanning
-
Unauthorised Network Activity
-
Web Application Compromise
-
Communication with a Known Bad
-
SOAR Platform
-
Configuration Refresh
-
Vulnerability Management
-
Issue Management
-
SOC Program Management
-
Incident Response
-
Air-Gapped Implementation
-
Non-Functional Requirements (NFR)
-
Business Case for SOAR
-
Functional Requirements
-
Technical Building Blocks
-
Operational Building Blocks
-
Platform Maintenance
-
Threat Hunting
-
SOAR Vendors
Participants3
Lesson 1 of 16
In Progress
SOAR Playbooks
Lesson Content
0% Complete
0/27 Steps