Incydr Workflow is a must attend for security analysts and practitioners using the Code42 Incydr product. This course will give you best practices and tips on using Incydr daily.
This course explores the risk of unauthorized data usage and exfiltration performed by insiders and how Incydr's Insider Risk Indicators (IRIs) can help decrease time to detection and speed up the investigation of security events.
No hands-on labs are available during this recorded course.
This course is also offered as a live, instructor-led training with hands-on labs. For more information, click here.
Read More
This session is for Code42 Incydr Administrators and Security Professionals that will be setting up and configuring the Incydr product.
This course explores the initial setup and on-going user, device, and environment management of an Incydr deployment.
No hands-on labs are available during this recorded course.
This course is also offered as a live, instructor-led training with hands-on labs. For more information, click here.
Read More
This course will give you all the knowledge you need to install the Code42CLI, get started running commands, and find additional information.
Read More
In today’s collaboration era, where your insiders (employees, vendors, contractors) can access company data 24/7/365 from anywhere in the world, the security methods of yesterday to guard data no longer hold up. This course is for all security professionals -- from Analyst to CISO -- who want to learn more about Insider Risk Management and how to move from guard to guide.
Read More
This complimentary, on-demand course goes through the different configurations available to take full advantage of Code42 Incydr's data collection and detection capabilities including endpoint monitoring, setting up alerts, the user detection lists, trusted domains, and data connections.
Read More
This complimentary, on-demand course goes through the operations of using Code42's Incydr to leverage the Risk Exposure dashboard, use Alerts, adding and monitoring High Risk and Departing employees.
Read More
In this complimentary, on-demand course we cover all things user management, from enrolling users manually to assigning them to an organization and ensuring they have the correct roles.
Read More
This complimentary, on-demand course walks through the essential operations of working with global device settings including general, device backup, reporting, networking and security settings.
Read More
This complimentary, on-demand course on controlling user actions covers disabling, logging out, and removing users and devices from Code42.
Read More
In this complimentary, on-demand course you will learn how to dramatically speed up forensic investigations with Code42 Forensic File Search.
Read More
This complimentary, on-demand course demonstrates how to enable endpoint monitoring, review security events and monitor user activity to help you protect against internal and external threats to your organization’s intellectual property.
Read More
In this complimentary on-demand course learn how to use templates to customize the Code42 App. Customizations include the login field headers, co-branding imagery, and Home Screen message. (Code42 version 6.5 and later)
Read More
This complimentary, on-demand course provides an overview of the eDiscovery model and demonstrates how to create a preservation policy, add custodians to matters and collect files.
Read More
This complimentary, on-demand course provides a view of the Code42 application from an end-user perspective, from initial collection and management of backup selections to restoring a file and replacing a device.
Read More
This complimentary, on-demand course provides a high-level overview of how the Code42 platform works in multiple self-paced videos. We review the Code42 solution architecture, discuss how the file collection process works—including how files are selected—and conclude with how Code42 intelligently uses data deduplication to make ongoing file collection faster.
Read More