-
After this one day training participants will be able to explain the Vision One solution, describe the frameworks which underpin Vision One, and
use Vision One as a Threat Investigation tool more effectively. Training is delivered through demonstrations, hands on activities and slides. -
Course Contents
-
Background
- MITRE ATT&CK Framework
- Adversary TTPs
- Mapping Threat Data to ATT&CK
- Preventing Future Attacks with MITRE
- Regulatory Compliance
Introduction to Vision One
- Solution Overview
- Strategy and Future Vision
- EDR vs SIEM vs Vision One
- Product Connections & Data flow
- Telemetry Sources
- Third Party Integration with Vision One
Introduction to Vision One Apps
- Security Posture
- Threat Intelligence
- Detection Models
- Workbench/Execution Profile
- Observed Attack Techniques
- Search
- Response Management
- Inventory Apps
- Settings
In this course, each student will receive the slides with comments from the trainer in the Trend Micro Education Portal.
-
Target Group
-
- Trend Micro Partners
-
Knowledge Prerequisites
-
Knowledge of networking concepts, security principles, and cloud technologies are required.
-
Course Objective
-
After completing this training participants will be able to:
- Explain the Vision One solution
- Describe the frameworks which underpin Vision One (MITRE&ATTCK)
- Utilise Vision One as a Threat Investigation tool more effectively
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
After this one day training participants will be able to explain the Vision One solution, describe the frameworks which underpin Vision One, and
use Vision One as a Threat Investigation tool more effectively. Training is delivered through demonstrations, hands on activities and slides. -
Course Contents
-
Background
- MITRE ATT&CK Framework
- Adversary TTPs
- Mapping Threat Data to ATT&CK
- Preventing Future Attacks with MITRE
- Regulatory Compliance
Introduction to Vision One
- Solution Overview
- Strategy and Future Vision
- EDR vs SIEM vs Vision One
- Product Connections & Data flow
- Telemetry Sources
- Third Party Integration with Vision One
Introduction to Vision One Apps
- Security Posture
- Threat Intelligence
- Detection Models
- Workbench/Execution Profile
- Observed Attack Techniques
- Search
- Response Management
- Inventory Apps
- Settings
In this course, each student will receive the slides with comments from the trainer in the Trend Micro Education Portal.
-
Target Group
-
- Trend Micro Partners
-
Knowledge Prerequisites
-
Knowledge of networking concepts, security principles, and cloud technologies are required.
-
Course Objective
-
After completing this training participants will be able to:
- Explain the Vision One solution
- Describe the frameworks which underpin Vision One (MITRE&ATTCK)
- Utilise Vision One as a Threat Investigation tool more effectively
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.