Part I Threat and Vulnerability Management
Chapter 1 The Importance of Threat Data and Intelligence
Chapter 2 Threat Intelligence in Support of Organizational Security
Chapter 3 Vulnerability Management Activities
Chapter 4 Vulnerability Assessment Tools
Chapter 5 Threats and Vulnerabilities Associated with Specialized Technology
Chapter 6 Threats and Vulnerabilities Associated with Operating in the Cloud
Chapter 7 Mitigating Controls for Attacks and Software Vulnerabilities
Part II Software and Systems Security
Chapter 8 Security Solutions for Infrastructure Management
Chapter 9 Software Assurance Best Practices
Chapter 10 Hardware Assurance Best Practices
Part III Security Operations and Monitoring
Chapter 11 Data Analysis in Security Monitoring Activities
Chapter 12 Implement Configuration Changes to Existing Controls to Improve Security
Chapter 13 The Importance of Proactive Threat Hunting
Chapter 14 Automation Concepts and Technologies
Chapter 15 The Importance of the Incident Response Process
Chapter 16 Appropriate Incident Response Procedures
Chapter 17 Analyze Potential Indicators of Compromise
Chapter 18 Utilize Basic Digital Forensics Techniques
Part V Compliance and Assessment
Chapter 19 The Importance of Data Privacy and Protection
Chapter 20 Security Concepts in Support of Organizational Risk Mitigation
Chapter 21 The Importance of Frameworks, Policies, Procedures, and Controls
Part VI Appendixes and Glossary
3.147.36.213