Course curriculum

    1. Overview - Endpoint Detection & Response

    2. Dashboard

    3. Alerts & Events

    4. Endpoints

    5. Endpoint - Detailed view

    6. Configuration

    7. Search

    8. Features

    9. Process handling

    10. Environment Integration

    1. Prerequisites

    2. Windows Install

    3. Linux Install

    4. MacOS Install

    5. Agent Configuration

    6. Endpoint Companion (Tray)

    7. Virtual Desktop Infrastructures

    8. Upgrades

    9. Windows Uninstallation

    10. Linux Uninstall

    11. MacOS Uninstallation

    1. Alerts & Events (Advanced)

    2. TEHTRIS Cyberia eGuardian

    3. Action Manager

    4. Exports

    5. TEHTRIS CTI

    6. Scripts

    1. EDR

    2. Application Policy

    3. Firewall Policy

    4. Whitelist / Blacklist

    5. Yara Policies

    6. Yara Catalog

    1. Access Log

    2. AutoStarts

    3. AI Analysis (Formerly CyberAI-NGAV)

    4. Driver

    5. EDR Tray agent

    6. IOC Hunting

    7. LSASS Monitoring

    8. Memory Scanning

    9. Microsoft Office Monitoring

    10. Network Monitoring

    11. PowerShell Monitoring

    12. Process Monitoring

    13. Ransomware Monitoring

    14. Registry Monitoring

    15. Shadow IT

    16. EPP Installer (Option)

    17. Endpoint Firewall (Option)

    18. Event Log (Option)

    19. ScanDisk (Option)

    20. USB Monitoring (Option)

    21. Audit (Deprecated)

    22. Compliance (Deprecated)

    23. Updater (Deprecated)

    1. Installation troubleshooting

    2. System tray issues

    3. Performance issues

    4. Network issues

    5. Agent

    6. Known issues

The Technical Reference

  • 62 lessons
  • Configuration
  • Modules Deep Dive
  • Troubleshooting