Security Monitoring (Remediation)
Introduction to the remediation application and to this course.
Understanding and selecting an attack path
In this topic, you will learn how to understand the detail of an attack path and to select the one you want to remediate.
Remediating an attack path
In this topic, you will learn to remediate the attack path you have selected in the last topic. We will detail how you can select the remediation candidate that best suit to your needs.