This chapter is from the book
Review Key Topics
Review the most important topics in the chapter, noted with the Key Topic icon in the outer margin of the page. Table 7-3 lists a reference of these key topics and the page number on which each is found.

Table 7-3 Key Topics for Chapter 7
Key Topic Element |
Description |
Page Number |
---|---|---|
Paragraph |
Defining threat hunting |
175 |
Paragraph |
Understanding security advisories, bulletins, and what a CVE is |
177 |
Paragraph |
Understanding false positives and false negatives |
181 |
Section |
Credentialed vs. Noncredentialed |
182 |
Section |
Intrusive vs. Nonintrusive |
182 |
Paragraph |
Defining what SIEM is |
186 |
Paragraph |
Understanding the SOAR concept |
188 |