Skip to content

Commit a347db2

Browse files
committed
fixed threat manager links
1 parent d6346b7 commit a347db2

File tree

8 files changed

+20
-20
lines changed

8 files changed

+20
-20
lines changed
Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
1-
import { NTM } from '@site/src/products';
1+
import { NTM } from '@site/src/training/products';
22

33
## 1560 <NTM /> – Valuable Features
44

55
Recommended prerequisite: None
66

77
The <NTM /> – Valuable Features course provides an understanding of the key aspects of the application.
88

9-
Estimated length: 5 minutes
9+
Estimated length: 5 minutes
Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
1-
import { NTM } from '@site/src/products';
1+
import { NTM } from '@site/src/training/products';
22

33
## 2560 <NTM /> – Concepts & Architecture
44

55
Recommended prerequisite: 1560 <NTM /> – Valuable Features
66

77
The <NTM /> – Concepts & Architecture course provides a fundamental understanding of the applications’ concepts and architecture.
88

9-
Estimated length: 10 minutes
9+
Estimated length: 10 minutes

src/training/threat-manager/3560.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
import { NTM } from '@site/src/products';
1+
import { NTM } from '@site/src/training/products';
22

33
## 3560 Introduction to <NTM />
44

@@ -9,4 +9,4 @@ The Introduction to <NTM /> course provides users with the information needed to
99
* Installation & Configuration
1010
* Threats
1111

12-
Estimated length: 1 hour
12+
Estimated length: 1 hour
Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
1-
import { NTM } from '@site/src/products';
1+
import { NTM } from '@site/src/training/products';
22

33
## 3561 <NTM /> – Investigations
44

55
Recommended prerequisite: 3560 Introduction to <NTM />
66

7-
The <NTM /> – Investigations course provides users with the ability to create their own investigations.
7+
The <NTM /> – Investigations course provides users with the ability to create their own investigations.
88

9-
Estimated length: 20 minutes
9+
Estimated length: 20 minutes
Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
1-
import { NTM } from '@site/src/products';
1+
import { NTM } from '@site/src/training/products';
22

33
## 3562 <NTM /> – Threat Tuning
44

55
Recommended prerequisite: 3561 <NTM /> – Investigations
66

7-
The <NTM /> – Threat Tuning course enables users to reduce false positives, to eliminate noise, in an effort to ensure the threats fit the target environment after initial implementation.
7+
The <NTM /> – Threat Tuning course enables users to reduce false positives, to eliminate noise, in an effort to ensure the threats fit the target environment after initial implementation.
88

9-
Estimated length: 35 minutes
9+
Estimated length: 35 minutes
Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
1-
import { NTM } from '@site/src/products';
1+
import { NTM } from '@site/src/training/products';
22

33
## 3563 <NTM /> – Playbooks
44

55
Recommended prerequisite: 3562 <NTM /> – Threat Tuning
66

7-
The <NTM /> – Playbooks course enables users to employ existing playbooks as well as create custom playbooks.
7+
The <NTM /> – Playbooks course enables users to employ existing playbooks as well as create custom playbooks.
88

9-
Estimated length: 20 minutes
9+
Estimated length: 20 minutes

src/training/threat-manager/5560.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
import { NTM } from '@site/src/products';
1+
import { NTM } from '@site/src/training/products';
22

33
## 5560 <NTM /> – Demo the Basic Use Cases
44

@@ -13,4 +13,4 @@ The <NTM /> – Demo the Basic Use Cases course provides you with the ability to
1313

1414
When you complete this course, you will understand the scenario and demonstration talking points for each use case.
1515

16-
Estimated length: 20 minutes
16+
Estimated length: 20 minutes

src/training/threat-manager/additional.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
import { NTM } from '@site/src/products';
1+
import { NTM } from '@site/src/training/products';
22

33
## Additional <NTM /> Courses for Partners
44

@@ -13,6 +13,6 @@ This product was formerly named Netwrix StealthDEFEND.
1313
* What's New in <NTM /> v3.0
1414
* Protect your Active Directory Against Common Cyber Threats
1515
* Top 5 Issues in <NTM />
16-
* <NTM /> Deployment Best Practices
16+
* <NTM /> Deployment Best Practices
1717
* <NTM /> Playbooks and Responses
18-
* Cyber Security Boot Camp: Enterprise Data Security – Structured and Unstructured Data
18+
* Cyber Security Boot Camp: Enterprise Data Security – Structured and Unstructured Data

0 commit comments

Comments
 (0)