Objectives 1 2 3 Threat and Vulnerability Security Operations and Software and Systems Security Management Monitoring 1-Threat 1-security solutions for infrastructure management 1-Data Analysis 2-Threat intelligence 2-Identity and access management 2-Endpoint Data Analysis 3-Attack frameworks 3-software Security 3-Network Data Analysis 4-Vulnerability management 4-hardware Security 4-E-mail Analysis 5-Vulnerability assessment tools 5-Log & SIEM review 6-Threats and vulnerabilities for systems 6-Configuration changes 7-Attacks and software vulnerabilities 7-Threat hunting 8-Automation concepts and technologies
4 5
Incident Response Compliance and Assessment
1-Importance of the incident response process 1-Data privacy and protection 2-Incident response procedure 2-Organizational risk mitigation 3-Indicators of compromise 3-Frameworks, policies, procedures, and controls. 4-Digital forensics techniques Threat and Vulnerability Management Threat Threat and Vulnerability Management Threat Threat and Vulnerability Management Threat Threat and Vulnerability Management Threat Threat and Vulnerability Management Threat intelligence Threat and Vulnerability Management Threat intelligence Threat and Vulnerability Management Attack frameworks
مرجع ومصدر مفيد
مقال عبدالعزيز الصنات https://caramellaapp.com/nightwing/IXK-VfiqG/cyber-kill-chain Threat and Vulnerability Management Attack frameworks
مرجع ومصدر مفيد
باللغة العربيةMITRE ATT&CK Nowayer ، محمد السحيمي، ثامر الشمري، مالك الدوسري https://github.com/Malajab/incyber/tree/master/MITRE-ATT%26CK-AR Threat and Vulnerability Management Vulnerability management
مرجع ومصدر مفيد
Ben Scudera مقال https://www.coalfire.com/the-coalfire-blog/june-2018 Threat and Vulnerability Management Vulnerability management
مرجع ومصدر مفيد
Ben Scudera مقال https://www.coalfire.com/the-coalfire-blog/june-2018 Threat and Vulnerability Management Vulnerability assessment tools. Threat and Vulnerability Management Threats and vulnerabilities for systems Threat and Vulnerability Management Threats and vulnerabilities for systems Threat and Vulnerability Management Attacks and software vulnerabilities Threat and Vulnerability Management Attacks and software vulnerabilities Threat and Vulnerability Management Attacks and software vulnerabilities Software and Systems Security Security solutions for infrastructure management Software and Systems Security Security solutions for infrastructure management Software and Systems Security Security solutions for infrastructure management Software and Systems Security Software Security Software and Systems Security Hardware Security Software and Systems Security Software Security Security Operations and Monitoring Data Analysis Security Operations and Monitoring Endpoint Data Analysis Security Operations and Monitoring Network Data Analysis Security Operations and Monitoring E-mail Analysis Security Operations and Monitoring Log & SIEM review Security Operations and Monitoring Configuration changes Security Operations and Monitoring Threat hunting Security Operations and Monitoring Automation concepts and technologies Incident Response Importance of the incident response process Incident Response Incident response procedure Incident Response Indicators of compromise Incident Response Digital forensics techniques Compliance and Assessment Data privacy and protection Compliance and Assessment Frameworks, policies, procedures, and controls.