Book Materials
Textbook
Chapter to Objective Mapping
Chapter 01
Today's Cybersecurity Analyst
Chapter 02
System and Network Architecture
Chapter 03
Malicious Activity
Chapter 04
Threat Intelligence
Chapter 05
Reconnaissance and Intelligence Gathering
Chapter 06
Designing a Vulnerability Management Program
Chapter 07
Analyzing Vulnerability Scans
Chapter 08
Responding to Vulnerabilities
Chapter 09
Building an Incident Response Program
Chapter 10
Incident Detection and Analysis
Chapter 11
Containment, Eradication, and Recovery
Chapter 12
Reporting and Communication
Chapter 13
Performing Forensic Analysis and Techniques for Incident Response