Top & Trending

Trending
philip
Courses cannot be purchased or accessed from this site. If you would like to register for this course, please contact your FireEye account manager. This information is also available as a…
vanessa.hanks
Description This is a 2 day class. Please see the catalog entry for this course.   Course Prerequisites Students should have completed at least one FireEye deployment courses (ILT or eLearning) or…
vanessa.hanks
Description This is a 2 day class. Please see the catalog entry for this course.   Course Prerequisites Students should have completed at least one FireEye deployment courses (ILT or eLearning) or…
Matters Most
remus
This is a test post..   Look out for more post in future..
in remus's blog posts
Matters Most
fletus
I have been managing the FireEye platform for my organization for approximately a year now. We currently have the AX series, EX series, NX series and CM deployed. The platform has been easy to learn… (Show more)
in fletus's blog posts
Matters Most
carlota
When it comes to monitoring your endpoints for evil, Indicators of Compromise and Exploit Detection are two different approaches to protection.   Exploit Detection (ExD) describes the act of…