The document provides templates for incident reports, detailing procedures for both false positive and true positive incidents, including alert descriptions, investigation outcomes, and recommendations. It outlines key components such as the 5Ws (who, what, when, where, why), impact assessments, and indicators of compromise (IOCs). Additionally, it covers cybersecurity fundamentals, SOC operations, and various attack techniques, emphasizing the importance of detection and response in cybersecurity.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
59 views3 pages
CheatSheet - SAL1
The document provides templates for incident reports, detailing procedures for both false positive and true positive incidents, including alert descriptions, investigation outcomes, and recommendations. It outlines key components such as the 5Ws (who, what, when, where, why), impact assessments, and indicators of compromise (IOCs). Additionally, it covers cybersecurity fundamentals, SOC operations, and various attack techniques, emphasizing the importance of detection and response in cybersecurity.