001. Course Overview
002. Common Log Ingestion Concepts
003. Common Operating System Concepts
004. Common Infrastructure Concepts
005. Common IAM Concepts
006. Common Encryption Concepts
007. Protecting Sensitive Data
008. Common Network Architecture
009. Malicious Network Activity
010. Malicious Host Activity
011. Malicious Application Activity
012. Other Malicious Activity
013. Packet Capture Tools
014. Log Analysis Tools
015. Endpoint Detection and Response
016. DNS and IP Reputation Tools
017. File Analysis Tools
018. Sandboxing Tools
019. Email Analysis Tools
020. User and Entity Behavior Analytics
021. Scripting and Programming
022. Threat Actor Types
023. TTPs
024. CTI Confidence Levels
025. CTI Sources
026. CTI Sharing
027. Threat Hunting
028. Process Standardization
029. Streamlining Operations
030. Integrating Tools and Technology Into Security Operations