Chapter Kick-off
Threat Intelligence Chapter Kick-off
Threat Intelligence Principles
Threat Intelligence Definition
The Importance of Threat Intelligence
Types of Threat Intelligence
Intelligence Meets Security
Threat Intelligence Cycle
Dissemination and Feedback
Windows Registry Artifacts
Google Hacking
The Most Common Operators
Google Operators - Knowledge Check
Internet of Things (IOT) and Industrial Control Systems (ICS)
IoT Applications in Different Domains
Ready, Set, Lab!- Searching Shodan
Disaster Recovery
Introduction to Disaster Recovery
Disaster Recovery and Threat Intelligence
Essential Concepts and Objectives
Components and Structure of DRP
Disaster Recovery Team Responsibilities
Testing, Maintenance, and Updating of DRPs
Identifying Potential Threats and Vulnerabilities
Conducting a Business Impact Analysis (BIA)
Analyzing Risk Factors and Their Impact on Business Operations
Key Elements of BCP Development
Role of a BCP in Disaster Recovery
What is Data Backup and Recovery?
Backup Strategies and Methods
Data Restoration and Recovery Techniques
Chapter Closure