
{"id":26117,"date":"2025-10-03T06:33:14","date_gmt":"2025-10-03T06:33:14","guid":{"rendered":"https:\/\/stage.cloudthat.com\/training\/?post_type=stm-courses&#038;p=26117"},"modified":"2025-10-03T06:40:06","modified_gmt":"2025-10-03T06:40:06","slug":"security-command-center-enterprise-essentials","status":"publish","type":"stm-courses","link":"https:\/\/stage.cloudthat.com\/training\/google-cloud-certification\/security-command-center-enterprise-essentials","title":{"rendered":"Security Command Center Enterprise \u2013 Essentials"},"content":{"rendered":"<p><span class=\"TextRun SCXW47701916 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW47701916 BCX8\">This course offers a comprehensive introduction to <\/span><\/span><span class=\"TextRun SCXW47701916 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW47701916 BCX8\">Google Cloud Security Command Center (SCC) Enterprise<\/span><\/span><span class=\"TextRun SCXW47701916 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW47701916 BCX8\">, a Cloud-Native Application Protection Platform (CNAPP) that enables organizations to secure their cloud environments. <\/span><span class=\"NormalTextRun SCXW47701916 BCX8\">You\u2019ll<\/span><span class=\"NormalTextRun SCXW47701916 BCX8\"> explore SCC Enterprise\u2019s capabilities for threat detection, vulnerability management, and case management. The sessions include foundational theory and practical demonstrations, helping you understand how to use SCC Enterprise for risk identification, investigation, and remediation.<\/span><\/span><span class=\"EOP SCXW47701916 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This course offers a comprehensive introduction to Google Cloud Security Command Center (SCC) Enterprise, a Cloud-Native Application Protection Platform (CNAPP) that enables organizations to secure their cloud environments. You\u2019ll explore SCC Enterprise\u2019s capabilities for threat detection, vulnerability management, and case management. The sessions include foundational theory and practical demonstrations, helping you understand how to use [&hellip;]<\/p>\n","protected":false},"author":5091,"featured_media":0,"template":"","meta":{"footnotes":""},"stm_lms_course_taxonomy":[58],"metadata":{"stm_lms_product_id":["26118"],"_edit_lock":["1759473843:5091"],"_edit_last":["5091"],"permalink_customizer":["google-cloud-certification\/security-command-center-enterprise-essentials"],"permalink_customizer_regenerate_status":["1"],"popular_course":["0"],"_popular_course":["field_64253688bc2e5"],"course_banner_image":[""],"_course_banner_image":["field_63c69a6b81cf1"],"mobile_banner_image":[""],"_mobile_banner_image":["field_63cf93896d207"],"banner_link":[""],"_banner_link":["field_63c69a9681cf2"],"banner_image":[""],"_banner_image":["field_621873548f922"],"banner_description":["Learn how to prevent, detect, and respond to threats across Google Cloud using Security Command Center Enterprise. "],"_banner_description":["field_612c733ed3564"],"overview_section_heading":["Course Overview:"],"_overview_section_heading":["field_64538867ffdd0"],"after_completing_course_heading":["After completing this course, participants will be able to: "],"_after_completing_course_heading":["field_645c78ade3f50"],"after_completing_course_0_desciption":["Understand the core concepts and benefits of SCC Enterprise "],"_after_completing_course_0_desciption":["field_6103ad2f9f5b2"],"after_completing_course_1_desciption":["Leverage SCC Enterprise\u2019s advanced vulnerability management features "],"_after_completing_course_1_desciption":["field_6103ad2f9f5b2"],"after_completing_course_2_desciption":["Utilize SCC Enterprise to detect, investigate, and respond to threats "],"_after_completing_course_2_desciption":["field_6103ad2f9f5b2"],"after_completing_course_3_desciption":["Improve posture management and risk assessment in a multi-cloud environment "],"_after_completing_course_3_desciption":["field_6103ad2f9f5b2"],"after_completing_course_4_desciption":["Apply SCC Enterprise for real-time threat and vulnerability analysis "],"_after_completing_course_4_desciption":["field_6103ad2f9f5b2"],"after_completing_course":["5"],"_after_completing_course":["field_6103aae828228"],"key_features_heading":["Key Features:"],"_key_features_heading":["field_645388ceffdd1"],"key_features_0_lists":["<span class=\"TextRun SCXW69718223 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW69718223 BCX8\">Threat Detection in Action<\/span><\/span><span class=\"TextRun SCXW69718223 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW69718223 BCX8\">: Learn how SCC detects and investigates real-world threats across cloud environments<\/span><\/span><span class=\"EOP SCXW69718223 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span>"],"_key_features_0_lists":["field_6103ad559f5b3"],"key_features_1_lists":["<span class=\"TextRun SCXW231001693 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW231001693 BCX8\">Integrated Risk Management<\/span><\/span><span class=\"TextRun SCXW231001693 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW231001693 BCX8\">: Understand posture and vulnerability management in multi-cloud setups<\/span><\/span><span class=\"EOP SCXW231001693 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span>"],"_key_features_1_lists":["field_6103ad559f5b3"],"key_features_2_lists":["<span class=\"TextRun SCXW165315067 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW165315067 BCX8\">Enterprise-Grade Use Cases<\/span><\/span><span class=\"TextRun SCXW165315067 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW165315067 BCX8\">: Experience walkthroughs for <\/span><span class=\"NormalTextRun SCXW165315067 BCX8\">identifying<\/span><span class=\"NormalTextRun SCXW165315067 BCX8\"> and resolving cloud risks<\/span><\/span><span class=\"EOP SCXW165315067 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span>"],"_key_features_2_lists":["field_6103ad559f5b3"],"key_features_3_lists":["<span class=\"TextRun SCXW46068176 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW46068176 BCX8\">Cloud-Native Protection<\/span><\/span><span class=\"TextRun SCXW46068176 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW46068176 BCX8\">: Explore how CNAPP principles are applied in Google Cloud<\/span><\/span><span class=\"EOP SCXW46068176 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span>"],"_key_features_3_lists":["field_6103ad559f5b3"],"key_features_4_lists":["<span class=\"TextRun SCXW28986199 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW28986199 BCX8\">Live Demos and Instructor Guidance<\/span><\/span><span class=\"TextRun SCXW28986199 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW28986199 BCX8\">: Delivered through engaging lectures and hands-on sessions<\/span><\/span><span class=\"EOP SCXW28986199 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span>"],"_key_features_4_lists":["field_6103ad559f5b3"],"key_features":["5"],"_key_features":["field_6103aaff28229"],"who_should_attend_heading":[""],"_who_should_attend_heading":["field_645388faffdd2"],"who_should_attend":[""],"_who_should_attend":["field_6103ab0d2822a"],"prerequisites_heading":["Prerequisites:"],"_prerequisites_heading":["field_64538a51ffdd3"],"prerequisites_text":["To get the most out of this course, it is recommended that participants have:\r\n<li>Baseline experience with cloud infrastructure and security, along with familiarity with the Google Cloud Console, is recommended. <li\\>"],"_prerequisites_text":["field_612c7498c4b84"],"question_sets_details_heading":[""],"_question_sets_details_heading":["field_65d303841f38d"],"question_sets_details_description":[""],"_question_sets_details_description":["field_65d303841f38e"],"question_sets_details_button_text":[""],"_question_sets_details_button_text":["field_65d303841f38f"],"question_sets_details_question_sets":[""],"_question_sets_details_question_sets":["field_65d303841f390"],"question_sets_details":[""],"_question_sets_details":["field_65d303841f38c"],"category_features_heading":[""],"_category_features_heading":["field_644b8ff35049c"],"category_features_features":[""],"_category_features_features":["field_644b90025049d"],"category_features_cta_text":[""],"_category_features_cta_text":["field_644b90285049f"],"category_features_cta_link":[""],"_category_features_cta_link":["field_644b902d504a0"],"category_features":[""],"_category_features":["field_644b8fe15049b"],"course_features_0_heading":["Why choose CloudThat as your training partner? "],"_course_features_0_heading":["field_644a0fae0e67e"],"course_features_0_features_list_0_list":["Specialized GCP Focus:\u202fCloudThat specializes in cloud technologies, offering focused and specialized training programs. We are Authorized Trainers for the Google Cloud Platform. This specialization ensures in-depth coverage of GCP services, use cases, best practices, and hands-on experience tailored specifically for GCP. "],"_course_features_0_features_list_0_list":["field_644a0fc80e680"],"course_features_0_features_list_1_list":["Industry-Recognized Trainers:\u202fCloudThat has a strong pool of industry-recognized trainers certified by GCP. These trainers bring real-world experience and practical insights into the training sessions, comprehensively understanding how GCP is applied in different industries and scenarios. "],"_course_features_0_features_list_1_list":["field_644a0fc80e680"],"course_features_0_features_list_2_list":["Hands-On Learning Approach:\u202fCloudThat emphasizes a hands-on learning approach. Learners can access practical labs, real-world projects, and case studies that simulate actual GCP environments. This approach allows learners to apply theoretical knowledge in practical scenarios, enhancing their understanding and skill set. "],"_course_features_0_features_list_2_list":["field_644a0fc80e680"],"course_features_0_features_list_3_list":["Customized Learning Paths:\u202fCloudThat understands that learners have different levels of expertise and varied learning objectives. We offer customized learning paths, catering to beginners, intermediate learners, and professionals seeking advanced GCP skills. "],"_course_features_0_features_list_3_list":["field_644a0fc80e680"],"course_features_0_features_list_4_list":["Interactive Learning Experience:\u202fCloudThat's training programs are designed to be interactive and engaging. We utilize various teaching methodologies like live sessions, group discussions, quizzes, and mentorship to keep learners engaged and motivated throughout the course. "],"_course_features_0_features_list_4_list":["field_644a0fc80e680"],"course_features_0_features_list_5_list":["Placement Assistance and Career Support:\u202fCloudThat often provides placement assistance and career support services. This includes resume building, interview preparation, and connecting learners with job opportunities through our network of industry partners and companies looking for GCP-certified professionals. "],"_course_features_0_features_list_5_list":["field_644a0fc80e680"],"course_features_0_features_list_6_list":["Continuous Learning and Updates:\u202fCloudThat ensures that our course content is regularly updated to reflect the latest trends, updates, and best practices within the GCP ecosystem. This commitment to keeping the content current enables learners to stay ahead in their GCP knowledge. "],"_course_features_0_features_list_6_list":["field_644a0fc80e680"],"course_features_0_features_list_7_list":["Positive Reviews and Testimonials:\u202fReviews and testimonials from past learners can strongly indicate the quality of training provided. You can Check feedback and reviews about our GCP courses that can provide potential learners with insights into the effectiveness and value of the training. "],"_course_features_0_features_list_7_list":["field_644a0fc80e680"],"course_features_0_features_list":["8"],"_course_features_0_features_list":["field_644a0fb70e67f"],"course_features_0_background_color":["a:1:{i:0;s:4:\"blue\";}"],"_course_features_0_background_color":["field_644a0fde0e681"],"course_features_1_heading":["Learning Objective:"],"_course_features_1_heading":["field_644a0fae0e67e"],"course_features_1_features_list_0_list":["After completing this course, learners will be equipped to effectively use Security Command Center Enterprise to protect their Google Cloud environments, manage vulnerabilities, detect threats, and apply risk mitigation strategies. "],"_course_features_1_features_list_0_list":["field_644a0fc80e680"],"course_features_1_features_list":["1"],"_course_features_1_features_list":["field_644a0fb70e67f"],"course_features_1_background_color":["a:1:{i:0;s:5:\"white\";}"],"_course_features_1_background_color":["field_644a0fde0e681"],"course_features":["2"],"_course_features":["field_644a0fa10e67d"],"certification_heading":["Certification Details: "],"_certification_heading":["field_64538bffffdd5"],"certification_0_short_description":[""],"_certification_0_short_description":["field_6103ab2f2822c"],"certification_0_list_content":["CloudThat Course Completion Certificate "],"_certification_0_list_content":["field_6103ab4a2822d"],"certification_0_image":["15024"],"_certification_0_image":["field_6103ab5b2822e"],"certification":["1"],"_certification":["field_6103ab1a2822b"],"about_trainer":[""],"_about_trainer":["field_6103ab6c2822f"],"course_fee_heading":[""],"_course_fee_heading":["field_64538c1cffdd6"],"course_fee_list":[""],"_course_fee_list":["field_6103abb728234"],"brochure_pdf":[""],"_brochure_pdf":["field_61232e258f89b"],"trainer":[""],"_trainer":["field_6124990e13784"],"course_outline_heading":["Course Outline:"],"_course_outline_heading":["field_64538a8effdd4"],"course_section":["3"],"_course_section":["field_612f4f27b0276"],"note_section":[""],"_note_section":["field_616d3ed46bbd2"],"popular_sort":[""],"_popular_sort":["field_6172496402af3"],"related_courses":[""],"_related_courses":["field_61c453ca6b2dd"],"reviews_heading":[""],"_reviews_heading":["field_64538c39ffdd7"],"review_rating":[""],"_review_rating":["field_62a813a92bee6"],"total_review_count":[""],"_total_review_count":["field_62b002d8d2de5"],"average_review_count":[""],"_average_review_count":["field_62b00367d2de6"],"faq_heading":["FAQs:"],"_faq_heading":["field_64538c59ffdd8"],"educational_schema":[""],"_educational_schema":["field_652fbbf6f589a"],"curriculum":[""],"featured":[""],"views":["48"],"level":["intermediate"],"current_students":["0"],"duration_info":["1 Day"],"video_duration":[""],"status":[""],"status_dates":[""],"not_single_sale":[""],"price":["19900"],"sale_price":[""],"sale_price_dates":[""],"enterprise_price":[""],"not_membership":[""],"affiliate_course":[""],"affiliate_course_text":[""],"affiliate_course_link":[""],"expiration_course":[""],"end_time":[""],"drip_content":[""],"prerequisites":[""],"prerequisite_passing_level":[""],"announcement":[""],"faq":["[{\"question\":\"What is Security Command Center (SCC) Enterprise? \",\"answer\":\"SCC Enterprise is Google Cloud's CNAPP solution for centralized threat detection, vulnerability management, and case investigation. \"},{\"question\":\"What\u2019s the duration and delivery format of this course? \",\"answer\":\"The course is delivered as a 3-hour instructor-led training session with lectures and demos. \"},{\"question\":\"Who is this course intended for?\",\"answer\":\"Security professionals and cloud admins seeking to secure Google Cloud environments. \"},{\"question\":\"What will I learn in the vulnerability management module?\",\"answer\":\"Risk assessment, posture management, and hands-on vulnerability walkthroughs.\"},{\"question\":\"Does the course include live demos?\",\"answer\":\"Yes. Each module includes instructor-led demonstrations using SCC Enterprise.\"},{\"question\":\"Are multi-cloud risks covered?\",\"answer\":\"Yes. The course highlights risk and posture management across multi-cloud environments.\"},{\"question\":\"Do I need prior security experience?\",\"answer\":\"A basic understanding of cloud security and Google Cloud Console usage is recommended. \"},{\"question\":\"What is the focus of the threat detection module?\",\"answer\":\"It teaches how to detect, investigate, and act upon cloud-based security threats.\"},{\"question\":\"Is this course technical?\",\"answer\":\"It\u2019s designed for intermediate-level learners with a security or cloud background.\"},{\"question\":\"Will I get a certificate after completion?\",\"answer\":\"Yes. A CloudThat course completion certificate will be awarded.\"}]"],"course_files_pack":[""],"course_certificate":[""],"type":[""],"video_type":[""],"presto_player_idx":[""],"lesson_video":[""],"lesson_video_poster":[""],"lesson_video_width":[""],"lesson_shortcode":[""],"lesson_embed_ctx":[""],"lesson_youtube_url":[""],"lesson_stream_url":[""],"lesson_vimeo_url":[""],"lesson_ext_link_url":[""],"duration":[""],"preview":[""],"lesson_excerpt":[""],"lesson_files_pack":[""],"questions":[""],"quiz_style":[""],"duration_measure":[""],"correct_answer":[""],"passing_grade":[""],"re_take_cut":[""],"random_questions":[""],"answers":[""],"question_explanation":[""],"question_view_type":[""],"review_course":[""],"review_user":[""],"review_mark":[""],"order":[""],"absolute":[""],"sticky":[""],"sticky_threshold":[""],"sticky_threshold_color":[""],"stm_agenda":[""],"stm_host":[""],"stm_select_approved_denied":[""],"stm_multiselect_approved":[""],"stm_multiselect_denied":[""],"stm_date":[""],"stm_time":[""],"stm_timezone":[""],"stm_duration":[""],"stm_password":[""],"stm_waiting_room":[""],"stm_join_before_host":[""],"stm_host_join_start":[""],"stm_start_after_participants":[""],"stm_mute_participants":[""],"stm_enforce_login":[""],"stm_alternative_hosts":[""],"author_id":[""],"emails":[""],"wpdocs-meta-bdt":["19900"],"wpdocs-meta-gbp":["659"],"wpdocs-meta-rand":["5399"],"wpdocs-meta-aed":["1699"],"wpdocs-meta-usd":["599"],"offline_price":["25870"],"offline-bdt":[""],"offline-gbp":["1299"],"offline-rand":[""],"offline-aed":["2500"],"offline-usd":["1199"],"_yoast_wpseo_primary_stm_lms_course_taxonomy":["58"],"_yoast_wpseo_content_score":["90"],"_yoast_wpseo_estimated-reading-time-minutes":["1"],"course_section_0_module_title":["Introduction to Security Command Center Enterprise "],"_course_section_0_module_title":["field_612f5535940c3"],"course_section_0_module_description":[""],"_course_section_0_module_description":["field_612f564c921af"],"course_section_0_section_0_title":["Topics "],"_course_section_0_section_0_title":["field_612f5233b0278"],"course_section_0_section_0_lesson_list_0_lession_title":["Core functionality of SCC Enterprise"],"_course_section_0_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_1_lession_title":["Additional SCC Enterprise features"],"_course_section_0_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_2_lession_title":["Multi-cloud security terminology "],"_course_section_0_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_3_lession_title":["SCC service options"],"_course_section_0_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list":["4"],"_course_section_0_section_0_lesson_list":["field_612f530a0ac40"],"course_section_0_section_1_title":["Objectives "],"_course_section_0_section_1_title":["field_612f5233b0278"],"course_section_0_section_1_lesson_list_0_lession_title":["Explore SCC Enterprise\u2019s core functionality"],"_course_section_0_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_0_section_1_lesson_list_1_lession_title":["Explore SCC Enterprise\u2019s additional features"],"_course_section_0_section_1_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_0_section_1_lesson_list_2_lession_title":["Improve your multi-cloud security vocabulary"],"_course_section_0_section_1_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_0_section_1_lesson_list_3_lession_title":["Identify Security Command Center (SCC) options"],"_course_section_0_section_1_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_0_section_1_lesson_list":["4"],"_course_section_0_section_1_lesson_list":["field_612f530a0ac40"],"course_section_0_section_2_title":["Activities "],"_course_section_0_section_2_title":["field_612f5233b0278"],"course_section_0_section_2_lesson_list_0_lession_title":["Lecture, Demo, Discussion "],"_course_section_0_section_2_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_0_section_2_lesson_list":["1"],"_course_section_0_section_2_lesson_list":["field_612f530a0ac40"],"course_section_0_section":["3"],"_course_section_0_section":["field_612f51e6b0277"],"course_section_1_module_title":["SCC Enterprise Vulnerability Management Features"],"_course_section_1_module_title":["field_612f5535940c3"],"course_section_1_module_description":[""],"_course_section_1_module_description":["field_612f564c921af"],"course_section_1_section_0_title":["Topics "],"_course_section_1_section_0_title":["field_612f5233b0278"],"course_section_1_section_0_lesson_list_0_lession_title":["Vulnerability management fundamentals"],"_course_section_1_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_1_lession_title":["Risk assessment tools and techniques"],"_course_section_1_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_2_lession_title":["Posture management in SCC Enterprise"],"_course_section_1_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_3_lession_title":["Multi-cloud risk evaluation"],"_course_section_1_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_4_lession_title":["Vulnerability analysis walkthrough"],"_course_section_1_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list":["5"],"_course_section_1_section_0_lesson_list":["field_612f530a0ac40"],"course_section_1_section_1_title":["Objectives "],"_course_section_1_section_1_title":["field_612f5233b0278"],"course_section_1_section_1_lesson_list_0_lession_title":["Understand vulnerability management fundamentals"],"_course_section_1_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_1_section_1_lesson_list_1_lession_title":["Explore risk assessment and posture management features "],"_course_section_1_section_1_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_1_section_1_lesson_list_2_lession_title":["Assess and manage risks in multi-cloud environment"],"_course_section_1_section_1_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_1_section_1_lesson_list_3_lession_title":["View and interpret vulnerability analysis output"],"_course_section_1_section_1_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_1_section_1_lesson_list":["4"],"_course_section_1_section_1_lesson_list":["field_612f530a0ac40"],"course_section_1_section_2_title":["Activities"],"_course_section_1_section_2_title":["field_612f5233b0278"],"course_section_1_section_2_lesson_list_0_lession_title":["Lecture, Demo, Lab "],"_course_section_1_section_2_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_1_section_2_lesson_list":["1"],"_course_section_1_section_2_lesson_list":["field_612f530a0ac40"],"course_section_1_section":["3"],"_course_section_1_section":["field_612f51e6b0277"],"course_section_2_module_title":["SCC Enterprise Threat Detection Features "],"_course_section_2_module_title":["field_612f5535940c3"],"course_section_2_module_description":[""],"_course_section_2_module_description":["field_612f564c921af"],"course_section_2_section_0_title":["Topics "],"_course_section_2_section_0_title":["field_612f5233b0278"],"course_section_2_section_0_lesson_list_0_lession_title":["Basics of threat detection"],"_course_section_2_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_1_lession_title":["Investigating cloud threat activity"],"_course_section_2_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_2_lession_title":["Hands-on: Working with threats"],"_course_section_2_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list":["3"],"_course_section_2_section_0_lesson_list":["field_612f530a0ac40"],"course_section_2_section_1_title":["Objectives "],"_course_section_2_section_1_title":["field_612f5233b0278"],"course_section_2_section_1_lesson_list_0_lession_title":["Understand the fundamentals of threat detection"],"_course_section_2_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list_1_lession_title":["Detect and investigate cloud threat activity"],"_course_section_2_section_1_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list_2_lession_title":["Walk through threat detection in SCC Enterprise"],"_course_section_2_section_1_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list":["3"],"_course_section_2_section_1_lesson_list":["field_612f530a0ac40"],"course_section_2_section_2_title":["Activities "],"_course_section_2_section_2_title":["field_612f5233b0278"],"course_section_2_section_2_lesson_list_0_lession_title":["Lecture, Demo, Lab "],"_course_section_2_section_2_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_2_section_2_lesson_list":["1"],"_course_section_2_section_2_lesson_list":["field_612f530a0ac40"],"course_section_2_section":["3"],"_course_section_2_section":["field_612f51e6b0277"]},"acf":[],"_links":{"self":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses\/26117"}],"collection":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses"}],"about":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/types\/stm-courses"}],"author":[{"embeddable":true,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/users\/5091"}],"version-history":[{"count":3,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses\/26117\/revisions"}],"predecessor-version":[{"id":26121,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses\/26117\/revisions\/26121"}],"wp:attachment":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/media?parent=26117"}],"wp:term":[{"taxonomy":"stm_lms_course_taxonomy","embeddable":true,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm_lms_course_taxonomy?post=26117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}