In this session, you'll work through a simulated Advanced Persistent Threat scenario, leveraging Qualys EDR to identify suspicious activities across the entire attack chain. Follow the digital breadcrumbs as you hunt for evidence of Collection, Command and Control, Credential Access, Defense Evasion, Discovery, Execution, Lateral Movement, Persistence, Privilege Escalation, and even a CobaltStrike Beacon simulation.
But that's not all! Get an exclusive preview of Qualys' groundbreaking AI-assisted incident response capabilities that will revolutionize your security operations. Watch as AI automatically summarizes complex threat narratives, prioritizes critical findings, and presents actionable response options - turning hours of investigation into minutes of decisive action.
What You'll Master:
Skills/Knowledge Tags