Review Key Topics
Review the most important topics in the chapter, noted with the Key Topic icon in the outer margin of the page. Table 7-3 lists a reference of these key topics and the page number on which each is found.
Table 7-3 Key Topics for Chapter 7
Key Topic Element |
Description |
Page Number |
---|---|---|
Paragraph |
Defining threat hunting |
175 |
Paragraph |
Understanding security advisories, bulletins, and what a CVE is |
177 |
Paragraph |
Understanding false positives and false negatives |
181 |
Section |
Credentialed vs. Noncredentialed |
182 |
Section |
Intrusive vs. Nonintrusive |
182 |
Paragraph |
Defining what SIEM is |
186 |
Paragraph |
Understanding the SOAR concept |
188 |