Section 3: Protecting, Detecting, and Responding for Windows Environments
This section will describe the importance of continual assessment, monitoring, and security operations. You will learn about the different monitoring technologies that are used to detect and protect your environment, as well as how to gain insights from them.
This section includes the following chapters:
- Chapter 11, Security Monitoring and Reporting
- Chapter 12, Security Operations
- Chapter 13, Testing and Auditing
- Chapter 14, Top 10 Recommendations and the Future