Learn about threat detection as part of a defense in-depth strategy to protect, detect, and respond to cybercrime.
Describe signature-based and behavioral / heuristic detection methods
List the capabilities of on-premise threat detection and mitigation tools
Name the capabilities of hybrid and cloud threat detection and mitigation tools
Recognize the importance of Enterprise threat detection monitoring