Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
IR Prioritization
Attack Frameworks
MITRE ATT&CK
Diamond Model of Intrusion Analysis
Cyber Kill Chain