Table of contents: 1. Introduction to security operations and the SOC 2. Overview of SOC technologies 3. Assessing security operations capabilities 4. SOC strategy 5. The SOC infrastructure 6. Security event generation and collection 7. Vulnerability management 8. People and processes 9. The technology 10. Preparing to operate 11. Reacting to events and incidents 12. Maintain, revieā¦