SOC Bible
Ctrl
K
Copy
🤺
TTP
This page contains the Attacker TTP aka Tactics, Techniques and Procedures
Previous
SIEM deployment best practice
Next
Build End to End SOC on AWS