Online Training

Monitor Suspicious Activities: Part 1 (Version 9)

Learn how EventTracker monitors Suspicious Activities - In this video we discuss the list of the Back-end Files, their priority and their location.

Webcast: MITRE ATT&CK® Framework

Webcast: MITRE ATT&CK® Framework

Learn how MITRE ATT&CK highlights adversarial techniques, and utilize this framework to improve your cybersecurity readiness.

Register Now