{"id":61955,"date":"2025-11-11T06:00:00","date_gmt":"2025-11-11T14:00:00","guid":{"rendered":"https:\/\/www.sumologic.com\/resources\/folge-17-capture-the-flag-workshop"},"modified":"2026-01-07T07:26:33","modified_gmt":"2026-01-07T15:26:33","slug":"ep-17-capture-the-flag-workshop","status":"publish","type":"resource","link":"https:\/\/www.sumologic.com\/de\/podcast\/ep-17-capture-flag-workshop","title":{"rendered":"Folge 17: Capture-the-flag-Workshop"},"content":{"rendered":"\n<p>Erleben Sie Sumo Logic und verbessern Sie Ihre F\u00e4higkeiten bei der Bedrohungsjagd. Denken Sie wie ein Angreifer und lernen Sie, die raffiniertesten Bedrohungen von heute zu \u00fcberlisten. In diesem Workshop tauchen Sie in reale Erkennungs- und Reaktionsszenarien in einer Live-Laborumgebung ein, in der Sie mit der KI-gesteuerten Cloud-SIEM- und fortschrittlichen Analyseplattform von Sumo Logic Bedrohungen untersuchen, aufdecken und auf sie reagieren.<\/p>\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Erleben Sie Sumo Logic und verbessern Sie Ihre F\u00e4higkeiten bei der Bedrohungsjagd. Denken Sie wie ein Angreifer und lernen Sie, die raffiniertesten Bedrohungen von heute zu \u00fcberlisten. In diesem Workshop tauchen Sie in reale Erkennungs- und Reaktionsszenarien in einer Live-Laborumgebung ein, in der Sie mit der KI-gesteuerten Cloud-SIEM- und fortschrittlichen Analyseplattform von Sumo Logic Bedrohungen [&hellip;]<\/p>\n","protected":false},"author":372,"featured_media":60387,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"< 1","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"resource-type":[308],"resource-solution":[306],"translation_priority":[221]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false},"resource-type":[308],"resource-solution":[306],"class_list":["post-61955","resource","type-resource","status-publish","has-post-thumbnail","hentry","resource-type-podcast","resource-solution-secops-and-security-de"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/resource\/61955","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/types\/resource"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/users\/372"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media\/60387"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media?parent=61955"}],"wp:term":[{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/resource-type?post=61955"},{"taxonomy":"resource-solution","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/resource-solution?post=61955"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}