Nexus SecOps Learning Concepts¶
150 Most Important Concepts for AI-Powered Security Operations¶
This document lists the core concepts covered in the Nexus SecOps textbook, ordered roughly from foundational to advanced. These concepts form the knowledge graph that structures the learning experience.
Foundational Concepts (1-30)¶
- Confidentiality, Integrity, Availability (CIA Triad)
- Defense in Depth
- Cyber Kill Chain
- MITRE ATT&CK Framework
- Security Operations Center (SOC)
- SOC Analyst Tiers (1, 2, 3)
- Mean Time to Detect (MTTD)
- Mean Time to Acknowledge (MTTA)
- Mean Time to Respond (MTTR)
- Mean Time to Contain (MTTC)
- Dwell Time
- Alert Fatigue
- True Positive (TP)
- False Positive (FP)
- True Negative (TN)
- False Negative (FN)
- Security Event
- Security Incident
- Log Source
- Telemetry
- Endpoint Detection and Response (EDR)
- Network Traffic Analysis (NTA)
- Security Information and Event Management (SIEM)
- Data Lake
- Log Normalization
- Log Enrichment
- Schema Mapping
- Data Retention Policy
- Compliance Logging
- Syslog
Telemetry & Data Concepts (31-50)¶
- Windows Event Logs
- Sysmon
- JSON Logging
- Common Event Format (CEF)
- Elastic Common Schema (ECS)
- Splunk Common Information Model (CIM)
- Network Flow (NetFlow, IPFIX)
- Packet Capture (PCAP)
- DNS Logs
- Proxy Logs
- Firewall Logs
- VPN Logs
- Cloud Audit Logs (CloudTrail, Azure Activity)
- Identity and Access Management (IAM) Logs
- Authentication Logs
- Process Execution Logs
- File Integrity Monitoring (FIM)
- Registry Monitoring
- Command-Line Auditing
- PowerShell Logging
Detection Concepts (51-80)¶
- Indicator of Compromise (IOC)
- Tactics, Techniques, and Procedures (TTP)
- Signature-Based Detection
- Heuristic Detection
- Behavioral Analytics
- Anomaly Detection
- Baseline
- Threshold
- Correlation Rule
- Detection Rule
- Use Case
- Sigma Rule Format
- YARA Rule
- Snort/Suricata Rule
- Detection Logic
- Time Window
- Event Aggregation
- Detection Coverage
- Detection Gap
- Atomic Red Team
- Purple Teaming
- Detection Testing
- Tuning
- Alert Prioritization
- Severity Scoring
- MITRE ATT&CK Mapping
- ATT&CK Navigator
- Detection Engineering
- Rule Version Control
- False Positive Rate (FPR)
Triage & Investigation Concepts (81-100)¶
- Alert Triage
- Escalation Criteria
- Runbook
- Playbook
- Standard Operating Procedure (SOP)
- Enrichment
- Context
- Asset Inventory
- User Context
- Threat Context
- Timeline Analysis
- Pivoting
- Lateral Movement
- Initial Access
- Persistence Mechanism
- Command and Control (C2)
- Exfiltration
- Investigation Hypothesis
- Indicator Aggregation
- Attribution
Threat Intelligence Concepts (101-115)¶
- Threat Intelligence (TI)
- Strategic Intelligence
- Tactical Intelligence
- Operational Intelligence
- Technical Intelligence
- Indicator
- Threat Actor
- Campaign
- Confidence Score
- Indicator Freshness
- STIX (Structured Threat Information Expression)
- TAXII (Trusted Automated Exchange of Indicator Information)
- Threat Feed
- False Positive Indicator
- Indicator Enrichment
Automation & Response Concepts (116-130)¶
- Security Orchestration, Automation, and Response (SOAR)
- Automation
- Orchestration
- Workflow
- Decision Tree
- Approval Gate
- Containment
- Eradication
- Recovery
- Incident Response Lifecycle
- Incident Classification
- Incident Severity
- Safety Check
- Rollback Mechanism
- Rate Limiting
AI/ML Concepts (131-150)¶
- Machine Learning (ML)
- Supervised Learning
- Unsupervised Learning
- Semi-Supervised Learning
- Classification
- Regression
- Clustering
- Outlier Detection
- Feature Engineering
- Training Data
- Test Data
- Validation Data
- Overfitting
- Underfitting
- Precision
- Recall (Sensitivity)
- F1 Score
- ROC Curve
- AUC (Area Under Curve)
- Confusion Matrix
Advanced AI & LLM Concepts (Bonus: 151-170)¶
- Large Language Model (LLM)
- Prompt Engineering
- Few-Shot Learning
- Zero-Shot Learning
- Retrieval-Augmented Generation (RAG)
- Grounding
- Hallucination
- Prompt Injection
- Guardrail
- Input Validation
- Output Filtering
- Explainability
- Model Drift (Concept Drift)
- Model Retraining
- A/B Testing
- Evaluation Framework
- Bias in ML
- Adversarial Examples
- Privacy-Preserving ML
- Differential Privacy
Usage Notes¶
- Dependencies: See dependencies.csv for prerequisite relationships
- Taxonomy: See taxonomy.md for concept classification into 10 categories
- In-Text Linking: These concepts are linked throughout chapter content
- Glossary: Detailed definitions available in glossary.md
Total Concepts: 170 Core Concepts (Focus): 150 Document Version: 1.0.0 Last Updated: February 2026