Table of Contents
- Classifying Threats
- Operating System families and key differences in structure
- Computer Forensics and Evidence handling
- Identifying rogue data from a data set
- Warning signs from network data
- Network security data analysis
- Roles and responsibilities during an incident
- Network and Server Profiling
- Compliance Frameworks
- Data Normalization and Exploitation
- Drawing Conclusions From the Data
- The Cyber Kill Chain Model
- Incident Handling Activities
- Mock Exam 1
- Mock Exam 2

