Cyberattack Surface Reduction

Cyberattack Surface Reduction

Learn to use ExtraHop features to improve your environment's security posture.

rate limit

Code not recognized.

About this course

By the end of this module, you will be able to:
1) Identify devices accepting inbound connections
2) Recognize potential vulnerabilities using hardening detections
3) Outline options to address known vulnerabilities in the environment

Course Contents4 min

  • Cyberattack Surface Reduction

    Cyberattack Surface Reduction video

  • Cyberattack Surface Reduction Video 4 min
  • Additional Resources

    Links to ExtraHop Documentation and/or relevant articles

  • Additional Resources
  • Cyberattack Surface Reduction Quiz

    Cyberattack Surface Reduction knowledge check quiz

  • Cyberattack Surface Reduction Quiz
  • End of Course Survey

About this course

By the end of this module, you will be able to:
1) Identify devices accepting inbound connections
2) Recognize potential vulnerabilities using hardening detections
3) Outline options to address known vulnerabilities in the environment

Course Contents4 min

  • Cyberattack Surface Reduction

    Cyberattack Surface Reduction video

  • Cyberattack Surface Reduction Video 4 min
  • Additional Resources

    Links to ExtraHop Documentation and/or relevant articles

  • Additional Resources
  • Cyberattack Surface Reduction Quiz

    Cyberattack Surface Reduction knowledge check quiz

  • Cyberattack Surface Reduction Quiz
  • End of Course Survey