Table of Contents
- Security Posture
- Incident Response Process
- Understanding the Cybersecurity Kill Chain
- Reconnaissance
- Compromising the System
- Chasing a User's Identity
- Lateral Movement
- Privilege Escalation
- Security Policy
- Network Segmentation
- Active Sensors
- Threat Intelligence
- Investigating an Incident
- Recovery Process
- Vulnerability Management
- Log Analysis

