• System & Network Security Implementation Concepts
  • Threat Intelligence & Threat Gathering Concepts
  • Techniques to Determine Malicious Activity
  • Vulnerability Scanning Tools & Techniques
  • Identifying & Analyzing Malicious Activity
  • Tools for Identifying Malicious Activity
  • Attack Methodology Frameworks
  • Vulnerability Data Analysis and Prioritization
  • Incident Response Management Techniques
  • Incident Response Communication & Reporting
  • Vulnerability Reporting Concepts
  • Vulnerability Patching & Attack Surface Management