Description
Malware analysis & containment (Isolate infected endpoints)
Phishing email investigation (Headers, links, attachments)
Ransomware first response (Identify attack vector)
Open port scans (Nmap)
Dark web credential monitoring (Have I Been Owned?)
Firewall rule review
Leave feedback about this