June 2016
Intermediate to advanced
254 pages
7h 50m
English
Kevvie Fowler; Chris Pogue; Paul Hanley
This chapter guides the reader through how to identify and recover compromised systems and ensure the environment is secure, stable, and ready to resume business operations.
Indicator of Compromise (IoC); Indicators of Attack (IoA); Containment; Recovery; Isolating systems; Identifying compromised hosts; Certifying your environment; Restoring business services; Postmortem; Breach events; Cyber defensible position; Red Team