08: Threat Intelligence Collection and Analysis
09: Overview of Data Forensics and Analysis
10: Host-Based Data Collection Practices
11: Network-Based Data Collection Practices
12: Static and Dynamic Malware Triage
13: Containment, Remediation, and Eradication Strategies
14: Reporting, Lessons Learned, and Testing Scenarios