Chapter 11 Data Analysis in Security Monitoring Activities
Chapter 12 Implement Configuration Changes to Existing Controls to Improve Security
Chapter 13 The Importance of Proactive Threat Hunting
Chapter 14 Automation Concepts and Technologies
18.189.180.76