In this course, you will learn the tasks crucial to set up, administer, and manage Advanced Threat Defence (ATD), Data Exchange Layer (DXL), Threat Intelligence Exchange (TIE), and Active Response (MAR) solutions.
Our ATD with DXL, TIE and MAR Administration course provides an indepth look at each of the products and how they integrate with each other. In this course, you will learn the tasks crucial to set up, administer, and manage Advanced Threat Defense (ATD), Data Exchange Layer (DXL), Threat Intelligence Exchange (TIE), and Active Response (MAR) solutions. This combined solution enables you to gain better visibility to your environment, protecting and limiting exposure to threats and vulnerabilities. This course combines lectures and practical lab exercises with significant time allocated for hands-on interaction with the ATD, TIE, DXL, and MAR user interfaces, as well as detailed instructions for the integration of this solution.
Day 1
Day 2
Day 3
Day 4
This course is intended for system and network administrators, security personnel, auditors, and/or consultants concerned with system endpoint security
In this course, you will learn the tasks crucial to set up, administer, and manage Advanced Threat Defence (ATD), Data Exchange Layer (DXL), Threat Intelligence Exchange (TIE), and Active Response (MAR) solutions.
Our ATD with DXL, TIE and MAR Administration course provides an indepth look at each of the products and how they integrate with each other. In this course, you will learn the tasks crucial to set up, administer, and manage Advanced Threat Defense (ATD), Data Exchange Layer (DXL), Threat Intelligence Exchange (TIE), and Active Response (MAR) solutions. This combined solution enables you to gain better visibility to your environment, protecting and limiting exposure to threats and vulnerabilities. This course combines lectures and practical lab exercises with significant time allocated for hands-on interaction with the ATD, TIE, DXL, and MAR user interfaces, as well as detailed instructions for the integration of this solution.
Day 1
Day 2
Day 3
Day 4
This course is intended for system and network administrators, security personnel, auditors, and/or consultants concerned with system endpoint security