Upon completion of this chapter, you will be able to answer the following questions:
What are some features of examples of cybersecurity incidents?
What are the motivations of the threat actors behind specific security incidents?
What is the potential impact of network security attacks?
What is the mission of the Security Operations Center (SOC)?
What are some resources available to prepare for a career in cybersecurity operations?