Description
Incident Responder Course
The SentinelOne University Incident Response course provides participants with the knowledge and skills necessary to effectively use the SentinelOne platform for identifying and responding to incidents. Whether you’re a seasoned incident responder or just starting out, this course equips you with actionable insights and practical techniques.
Here are the key highlights of the SentinelOne University Incident Response course :
Course Overview :
The course focuses on hands-on incident response methodologies using the SentinelOne platform.
Participants will learn how to identify and analyze security incidents , leveraging the platform’s capabilities.
Learning Objectives :
Perform Incident Root Cause Analysis : Understand the origins of security incidents.
Triage Related Events : Investigate incidents by pivoting into the data lake.
Prioritize Threats and Alerts : Effectively manage and respond to security alerts.
Apply Mitigation Actions : Recommend and implement appropriate mitigation strategies.
Whether you’re an incident responder, security analyst, or IT professional, the SentinelOne University Incident Response course empowers you to proactively handle security incidents and protect your organization
The Incident Responder badge represents the ability to manage Threats and Alerts in the SentinelOne Management console. The recipient has the ability to use the EDR and XDR querying interfaces in Deep Visibility and Skylight to correlate events and create complex queries, filter searches, create groupings and statistical summaries, tune false positives with minimal risk exclusions, and intelligently use response actions to effectively mitigate Threats and Alerts.
Skills
- Create effective queries in Deep Visibility and Skylight
- Cyber Investigation (INV)
- Cybersecurity Defence Analysis (CDA)
- Endpoint Detection And Response
- Identify and tune false positives using minimal risk Exclusions.
- Incident Response
- Incident Response (CIR)
- Perform incident root cause analysis.
- Pivot incident investigation into the data lake to triage related events.
- Prioritize Threats and Alerts in the SentinelOne Management Console.
- Recommend and apply the appropriate Mitigation actions for Threats and Alerts.
- Respond to security incidents in the SentinelOne Management Console.
- Threat Analysis (TWA)
- Use S1QL 1.0 and PowerQuery (S1QL 2.0) to investigate security incidents.
Discover more from Expert Training
Subscribe to get the latest posts sent to your email.