- Techniques for evaluating the extent of damage caused by cyber incidents
- Assigning responsibilities and coordinating response efforts within the SOC team
- Detecting and mitigating real-life advanced persistent threats (APTs) in a simulated environment