🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Chapter 8 - 01 - Discuss Threat Hunting - 02_ocred_fax_ocred.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

Certified Cybersecurity Technician Exam 212-82 Network Security Assessment Techniques and Tools Threat Hunting Maturity IModel (HMIM)...

Certified Cybersecurity Technician Exam 212-82 Network Security Assessment Techniques and Tools Threat Hunting Maturity IModel (HMIM) (HIMIM) O The threat hunting maturity model (HMM) describes the quantity and quality of information collected from a network for investigation Q ' %y - 3 =3 » < 4 B g " [[AYA) VY Level 0: Level 1: Level 2: Level Level 33: - Level 4: ovative = Primarily *= Follows the = Adopts data = Creates (Creates | = Automates Automates depends on latest threat analysis custom data existing data automated reports reports procedures analysis analysis monitoring created by procedures procedures systems and = Moderate- Moderate- to others alerts igh- level hugh. hngh- *= High- to very- High- igh- to very

Use Quizgecko on...
Browser
Browser