Security Operations
- 2.1 Given a scenario, perform threat management activities.
- 2.2 Given a scenario, analyze indicators of compromise and formulate an appropriate response.
- 2.3 Given a scenario, perform vulnerability management activities.
- 2.4 Given a scenario, use the appropriate vulnerability assessment and penetration testing methods and tools.
- 2.5 Given a scenario, analyze vulnerabilities and recommend risk mitigations.
- 2.6 Given a scenario, use processes to reduce risk.
- 2.7 Given an incident, implement the appropriate response.
- 2.8 Explain the importance of forensic concepts.
- 2.9 Given a scenario, use forensic analysis tools.