Book Content
chapters • 21h8m total length
1. Security Posture
2. Incident Response Process
3. What is a Cyber Strategy?
4. Understanding the Cybersecurity Kill Chain
5. Reconnaissance
6. Compromising the System
7. Chasing a User’s Identity
8. Lateral Movement
9. Privilege Escalation
10. Security Policy
11. Network Segmentation
12. Active Sensors
13. Threat Intelligence
14. Investigating an Incident
15. Recovery Process
16. Vulnerability Management
17. Log Analysis














