Education Center

This cybersecurity education center is here for you to use for reference. Bookmark this spot, and come back to stay up-to-date. Deepwatch authors are adding more terms for you to use in your day-to-day work and security awareness training all the time.

In addition to the definitions and concepts explained below, here are a few authoritative cybersecurity resources that Deepwatch authors source their information. Check out current usage of terms and get acquainted with new words or concepts as they are added and developed.

Cybersecurity Services

What is a Managed Security Service Provider (MSSP)?

What is Managed Detection and Response (MDR)?

What is Extended Detection and Response (XDR)?

What is Endpoint Detection and Response (EDR)?

What is Vulnerability Management?

What is SOC as a Service (SOCaaS)?

What is Threat Hunting?

What is a Threat Hunter?

What is a Threat Hunt Hypothesis?

What does the term “Kill Chain” mean in cybersecurity?

Cybersecurity Technologies

What is a Security Incident and Event Management Platform (SIEM)?

What is a Security Operations Analytics and Response Platform (SOAR)?

What is a Firewall?

What is an Intrusion Prevention System (IPS)?

What is an Intrusion Detection System (IDS)?

What is Endpoint Security?

What is Identity and Access Management (IAM)?

What is Multi-Factor Authentication (MFA)?

What does the term “Kill Chain” mean in cybersecurity?

Information Security Terminology

What is a Security Operations Center (SOC)?

What is Cyber Threat Intelligence (CTI)?

What are Tactics, Techniques, and Procedures (TTPs)?

What are Indicators of Compromise (IoCs)?

What is Cyber Threat Hunting?

What is Zero Trust?

What are Advanced Persistent Threats (APTs)?

What does CIA in cybersecurity mean?

What is Cloud Computing?

What is a Distributed Denial-of-Service (DDoS) Attack?

What is the Difference between a Security Event, an Alert, and an Incident?

What is Incident Response (IR)?

What is an Incident Response Plan (IRP)?

What is an Insider Threat?

What is Machine Learning?

What is Phishing?

What is the MITRE ATT&CK Framework?

What is Operational Technology (OT)?

What is Threat Hunting?

What is a Threat Hunter?

What is a Threat Hunt Hypothesis?

What does the term “Kill Chain” mean in cybersecurity?

What is Alert Fatigue?

Information Security Skills

What do SOC Analysts do?

What does a CISO do?

What is the Cybersecurity Skills Gap?

What does a Threat Hunter do?

What does a Security Analyst do?

What is the NICE Framework?

Let's Talk

Ready to Become Cyber Resilient?

Meet with our managed security experts to discuss your use cases, technology and pain points and learn how Deepwatch can help.