Data analytics
Intrusion prevention systems and tools
Security vulnerability databases
CVE
CSS
Acceptable use policy
Network access control (NAC)
Disaster recovery and business continuity plans
Remote work policies
Active Directory Group Policy Objects (GPOs)
Footprinting
Scanning
Enumeration
Gaining access
Web attacks
Password attacks
Wireless attacks
Social-engineering
Man-in-the-middle
Malware
Out-of-band
DoS
DDoS
Resource exhaustion
Forced system outage
Packet generators