Incident Response. Threat Hunting. Vulnerability Assessments.
Download the Computer Security Incident Handling Guide by the National Institute of Standards and Technology.