Part I: Threat Management
Chapter 1: Conducting Reconnaissance
Chapter 2: Analyzing the Results of Reconnaissance
Chapter 3: Responding to Network-Based Threats
Chapter 4: Securing a Cooperate Network
Part II: Vulnerability Management
Chapter 5: Implementing Vulnerability Management Processes
Chapter 6: Vulnerability Scanning
Part III: Cyber Incident Response
Chapter 7: The Incident Response Process
Chapter 8: Determining the Impact of Incidents
Chapter 9: Preparing the Incident Response Toolkit
Chapter 10: Selecting the Best Course of Action
Part IV: Security Architectures
Chapter 11: Frameworks, Policies, Procedures and Controls
Chapter 12: Assuring Identity and Access Management
Chapter 13: Putting in Compensating Controls
Chapter 14: Secure Software Development
Part V: Technologies and Tools
Chapter 15: Prevention
Chapter 16: Collection
Chapter 17: Analysis
Chapter 18: Exploitation
Chapter 19: Forensics
Part VI: Appendices
Appendix A: About the CD
Glossary