01. Module Overview
02. Specific Types of Threats
03. What Is Cyber Threat Intelligence
04. Importance of Cyber Threat Intelligence
05. Threat Intelligence Classification
06. Strategic, Operational, and Tactical Intelligence
07. Gathering and Correlating Information
08. Stages of Risk Management
09. Risk Management Data Sources
10. Vulnerability Scanning
11. False Positive
12. False Positive Audits
13. False Negatives
14. Intrusive vs. Non-intrusive
15. Passively Test Security Controls
16. Credentialed vs. Non-credentialed
17. Identify Vulnerabilities and Lack of Security Controls
18. Identify Common Misconfigurations
19. Things to Remember
20. Common Vulnerabilities and Exposures (CVE)
21. CVSS
22. Security Information and Event Management (SEIM)
23. Security Orchestration, Automation, and Response