CONTENTS AT A GLANCE

Part I   Threat and Vulnerability Management

Chapter 1     The Importance of Threat Data and Intelligence

Chapter 2     Threat Intelligence in Support of Organizational Security

Chapter 3     Vulnerability Management Activities

Chapter 4     Vulnerability Assessment Tools

Chapter 5     Threats and Vulnerabilities Associated with Specialized Technology

Chapter 6     Threats and Vulnerabilities Associated with Operating in the Cloud

Chapter 7     Mitigating Controls for Attacks and Software Vulnerabilities

Part II   Software and Systems Security

Chapter 8     Security Solutions for Infrastructure Management

Chapter 9     Software Assurance Best Practices

Chapter 10   Hardware Assurance Best Practices

Part III   Security Operations and Monitoring

Chapter 11   Data Analysis in Security Monitoring Activities

Chapter 12   Implement Configuration Changes to Existing Controls to Improve Security

Chapter 13   The Importance of Proactive Threat Hunting

Chapter 14   Automation Concepts and Technologies

Part IV   Incident Response

Chapter 15   The Importance of the Incident Response Process

Chapter 16   Appropriate Incident Response Procedures

Chapter 17   Analyze Potential Indicators of Compromise

Chapter 18   Utilize Basic Digital Forensics Techniques

Part V   Compliance and Assessment

Chapter 19   The Importance of Data Privacy and Protection

Chapter 20   Security Concepts in Support of Organizational Risk Mitigation

Chapter 21   The Importance of Frameworks, Policies, Procedures, and Controls

Part VI   Appendixes and Glossary

Appendix A   Objective Map

Appendix B   About the Online Content

Glossary

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.147.36.213