Chapter 1 Applying Reconnaissance Techniques
Chapter 2 Analyzing the Results of Reconnaissance
Chapter 3 Responding to Network-Based Threats
Chapter 4 Securing a Corporate Network
Part II Vulnerability Management
Chapter 5 Implementing Vulnerability Management Processes
Chapter 6 Vulnerability Scanning
Part III Cyber Incident Response
Chapter 7 The Incident Response Process
Chapter 8 Determining the Impact of Incidents
Chapter 9 Preparing the Incident Response Toolkit
Chapter 10 Selecting the Best Course of Action
Part IV Security Architectures
Chapter 11 Frameworks, Policies, Controls, and Procedures
Chapter 12 Identity and Access Management
Chapter 13 Putting in Compensating Controls
Chapter 14 Secure Software Development
18.225.55.151