Book Content
chapters • 12h48m total length
1. Security Posture
2. Incident Response Process
3. Understanding the Cybersecurity Kill Chain
4. Reconnaissance
5. Compromising the System
6. Chasing a User's Identity
7. Lateral Movement
8. Privilege Escalation
9. Security Policy
10. Network Segmentation
11. Active Sensors
12. Threat Intelligence
13. Investigating an Incident
14. Recovery Process
15. Vulnerability Management
16. Log Analysis














