Home > Articles

This chapter is from the book

Review Key Topics

Review the most important topics in the chapter, noted with the Key Topic icon in the outer margin of the page. Table 7-3 lists a reference of these key topics and the page number on which each is found.

Table 7-3 Key Topics for Chapter 7

Key Topic Element

Description

Page Number

Paragraph

Defining threat hunting

175

Paragraph

Understanding security advisories, bulletins, and what a CVE is

177

Paragraph

Understanding false positives and false negatives

181

Section

Credentialed vs. Noncredentialed

182

Section

Intrusive vs. Nonintrusive

182

Paragraph

Defining what SIEM is

186

Paragraph

Understanding the SOAR concept

188

Pearson IT Certification Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.