What is EDR?
EDR's Role in Security
EDR vs. AV
EDR vs. Other Solutions
EDR Core Capabilities
EDR Architecture: Overview
Endpoint Agents
Data Collection & Processing
Analysis and Detection
Response and Remediation
Process Monitoring
File Activity
Network Connections
Registry Modifications
User Behavior
EDR Detection Methods
Behavioral Analysis in EDR
ML & Anomaly Detection
Threat Intel Integration
Detection Tuning
Malware Detection
Ransomware Detection
Phishing Detection
Lateral Movement
Fileless Attacks
Case Study Intro
Ransomware Case Study
Data Breach Case Study
Insider Threat Case
Advanced Threat Case
Threat Hunting Intro
Hunting with EDR Queries
Endpoint Anomaly Hunting
Network Based Hunting
Automated Threat Hunting
IR Lifecycle Intro
Prep with EDR
Detection & Analysis
Containment, Eradication
Recovery & Lessons
Endpoint Isolation 101
EDR Isolation Techniques
Limiting User Privileges
Application Control
Automated Containment
Forensic Data Collection
Process Analysis
File Activity Analysis
Network Connection Analysis
Registry Analysis
Generating EDR Reports
Interpreting EDR Reports
Compliance Standards
Custom Dashboards
Actionable Insights