Part I: Threat Management
Chapter 1: Applying Reconnaissance Techniques
Chapter 2: Analyzing the Results of Reconnaissance
Chapter 3: Responding to Network-Based Threats
Chapter 4: Securing a Cooperate Network
Part II: Vulnerability Management
Chapter 5: Implementing Vulnerability Management Processes
Chapter 6: Vulnerability Scanning
Part III: Cyber Incident Response
Chapter 7: The Incident Response Process
Chapter 8: Determining the Impact of Incidents
Chapter 9: Preparing the Incident Response Toolkit
Chapter 10: Selecting the Best Course of Action
Part IV: Security Architectures
Chapter 11: Frameworks, Policies, Controls, and Procedures
Chapter 12: Identity and Access Management
Chapter 13: Putting in Compensating Controls
Chapter 14: Secure Software Development
Chapter 15: Tool Sets