Table of Contents
- IAM, Logging, and Security Architecture
- Attack Frameworks
- Incident Response Preparation and Detection
- Incident Response - Containment, Eradication, Recovery, and Post-Incident Activities
- Efficiency in Security Operations
- Threat Intelligence and Threat Hunting
- Indicators of Malicious Activity
- Tools and Techniques for Malicious Activity Analysis
- Attack Mitigations
- Risk Control and Analysis
- Vulnerability Management Program
- Vulnerability Assessment Tools
- Vulnerability Prioritization
- Incident Reporting and Communication
- Vulnerability Management Reporting and Communication

