Summary
In this chapter, we discussed how to detect and investigate cyber threats by utilizing the flow metadata provided by network devices such as routers and layer 3 switches, and the alerts generated by security solutions such as AV, EDR, IPS, IDS, a network sandbox, and a network AV.
In the next chapter, we will learn about the threat intelligence platforms that should be used by SOC analysts to investigate cyber threats.