8.1 Monitoring continu

8.2 Detection d'intrusion (IDS/IPS)

8.3 Threat Intelligence

8.4 SOC – Security Operations Center

📚 Pages liées