These notes serve as external references that have been provided. They do not contain the full content but act as a repository for external knowledge and material for reference.
Session 19: Secure Configuration Management (SCM) Part 2
Session 19: Secure Configuration Management (SCM) Part 2
Session 20: Threat Intelligence and Threat Hunting
Session 20: Threat Intelligence and Threat Hunting
Session 21: Threat Intelligence and Threat Hunting Part 2
Session 21: Threat Intelligence and Threat Hunting Part 2