Text
Security operations center: building, operating, and maintaining your SOC
Table of contents:
1. Introduction to security operations and the SOC
2. Overview of SOC technologies
3. Assessing security operations capabilities
4. SOC strategy
5. The SOC infrastructure
6. Security event generation and collection
7. Vulnerability management
8. People and processes
9. The technology
10. Preparing to operate
11. Reacting to events and incidents
12. Maintain, review, and improve
No other version available