About Individual Course:
There are numerous cybersecurity tools available to help organizations detect threats. But, this volume creates a number of challenges, including siloed and disparate systems. While these tools are intended to improve the organization’s security posture, many of them require sophisticated staff with complex training to leverage them effectively. Sometimes, even with training, systems generate so many alerts the highly-skilled staff is unable to analyze and respond to real threats in a timely manner. This is not sustainable for even the largest security operations center (SOC). A holistic, automated approach to threat detection and analysis is necessary.
|Learning Style||Self-Paced Learning|
|Course Duration||1 Hour|
Michael has served as the Sr. cybersecurity advisor to 2 and 3 Star commander(s) and senior executive management regarding advanced techniques and developments in the Information Assurance / Cyber Security arena of Automated Information Systems (AIS). Responsible to both identify risk and recommend appropriate countermeasure within the enclave and isolated computing environments of the DoD (Department of Defence).