Email Intelligence with Lumu
Explore the features and deployment of Lumu Email Intelligence to discover who is targeting your organization, how they are doing it, and how successful they have been.
Describe the features and benefits of Lumu Email Intelligence to understand the unique compromise level that an organization is facing
Set up Lumu Email Intelligence for your organization
Lumu Academy
What to expect
How to Navigate Lumu Academy
Email Intelligence Overview
Why Lumu Email?
Benefits of Lumu Email Intelligence
Checkpoint
Forward your Email Metadata to Lumu
Lumu Documentation
Email Intelligence in the Lumu Portal
Emails Analyzed and Campaigns
Correlation
Checkpoint
Next Steps
Before you go...
We recommend having a working understanding of virtualization and enterprise networks, including DNS and Firewalls. You can start by taking the first course of the Deployment Learning Path: Introduction to Lumu Deployment.
Lumu Academy access is automated. Identify which course you want to take and click to enroll. Provide your access details and accept the terms. It's pretty much immediate! The enrollment will expire after 15 days, but do not worry, you can re-enroll in this course any time, and your progress is saved in your account.
Lumu Academy issues a certificate of completion upon successful completion of this course. The digital credentials allow you to present a rich and trustworthy record of your learning to anyone at any time.
You can print or save it away as PDF, quickly share on social media, or even display it on your LinkedIn profile. With one click, let your LinkedIn network know that you continually pursue excellence through your “always learning” approach.
If you have thoughts or suggestions, or if you would like to share your story, please contact Lumu Academy at [email protected].
Explore the key features and benefits of the Lumu Portal for operating cybersecurity proficiently
Free
Explore Lumu’s deployment options, basic administration, and an introduction on how to incorporate Continuous Compromise Assessment in security operations.
Free
Learn how to seamlessly deploy Lumu VA for unprecedented visibility into the detailed malicious activity of each private IP address in your network in real time.
Free