{"id":18,"date":"2019-08-02T16:32:40","date_gmt":"2019-08-02T15:32:40","guid":{"rendered":"http:\/\/soarexpert.com\/?page_id=18"},"modified":"2019-12-21T22:23:19","modified_gmt":"2019-12-21T22:23:19","slug":"playbooks","status":"publish","type":"page","link":"https:\/\/soarexpert.com\/index.php\/playbooks\/","title":{"rendered":"Playbooks"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter\" src=\"https:\/\/i0.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/10\/shutterstock_789462274_Phishing_Cropped.jpg?resize=640%2C374\" sizes=\"(max-width: 640px) 100vw, 640px\" srcset=\"https:\/\/i1.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/10\/shutterstock_789462274_Phishing_Cropped.jpg?w=848 848w, https:\/\/i1.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/10\/shutterstock_789462274_Phishing_Cropped.jpg?resize=300%2C175 300w, https:\/\/i1.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/10\/shutterstock_789462274_Phishing_Cropped.jpg?resize=768%2C448 768w\" alt=\"\" width=\"640\" height=\"374\" data-recalc-dims=\"1\" \/><\/p>\n<h3 style=\"text-align: center;\"><strong><a href=\"http:\/\/soarexpert.com\/wp-content\/uploads\/2019\/12\/Phishing-1.pdf\">Download Phishing Playbook<\/a><a role=\"button\" href=\"http:\/\/soarexpert.com\/index.php\/phishing-playbook\/\"><br \/><\/a><\/strong><br \/><img loading=\"lazy\" class=\"aligncenter\" src=\"https:\/\/i0.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/12\/Malware-sizefit.jpg?resize=640%2C425\" sizes=\"(max-width: 640px) 100vw, 640px\" srcset=\"https:\/\/i0.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/12\/Malware-sizefit.jpg?resize=1024%2C680 1024w, https:\/\/i0.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/12\/Malware-sizefit.jpg?resize=300%2C199 300w, https:\/\/i0.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/12\/Malware-sizefit.jpg?resize=768%2C510 768w, https:\/\/i0.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/12\/Malware-sizefit.jpg?w=1280 1280w\" alt=\"\" width=\"640\" height=\"425\" data-recalc-dims=\"1\" \/><\/h3>\n<h3 style=\"text-align: center;\"><strong><a href=\"http:\/\/soarexpert.com\/wp-content\/uploads\/2019\/12\/Malware_Outbreak-1.pdf\">Download Malware Outbreak Playbook<\/a><\/strong><\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter\" src=\"https:\/\/i0.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/12\/HACK.png?resize=591%2C327\" sizes=\"(max-width: 486px) 100vw, 486px\" srcset=\"https:\/\/i0.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/12\/HACK.png?w=486 486w, https:\/\/i0.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/12\/HACK.png?resize=300%2C166 300w\" alt=\"\" width=\"591\" height=\"327\" data-recalc-dims=\"1\" \/><\/p>\n<h3 style=\"text-align: center;\"><strong><a href=\"http:\/\/soarexpert.com\/wp-content\/uploads\/2019\/12\/UnauthAccess.pdf\">Download Unauthorized Access Playbook<\/a><\/strong><\/h3>\n<h3 style=\"text-align: center;\"><br \/><img loading=\"lazy\" class=\"aligncenter\" src=\"https:\/\/i0.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/12\/123.png?resize=575%2C371\" sizes=\"(max-width: 482px) 100vw, 482px\" srcset=\"https:\/\/i0.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/12\/123.png?w=482 482w, https:\/\/i0.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/12\/123.png?resize=300%2C194 300w\" alt=\"\" width=\"575\" height=\"371\" data-recalc-dims=\"1\" \/><\/h3>\n<h3 style=\"text-align: center;\"><strong><a href=\"http:\/\/soarexpert.com\/wp-content\/uploads\/2019\/12\/Virus-Outbreak.pdf\">Download Virus Outbreak Playbook<\/a><\/strong><\/h3>\n<h3 style=\"text-align: center;\"><br \/><img loading=\"lazy\" class=\"aligncenter\" src=\"https:\/\/i0.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/12\/trimm-ddos-teaser.jpg?resize=640%2C334\" sizes=\"(max-width: 640px) 100vw, 640px\" srcset=\"https:\/\/i2.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/12\/trimm-ddos-teaser.jpg?resize=1024%2C535 1024w, https:\/\/i2.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/12\/trimm-ddos-teaser.jpg?resize=300%2C157 300w, https:\/\/i2.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/12\/trimm-ddos-teaser.jpg?resize=768%2C401 768w, https:\/\/i2.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/12\/trimm-ddos-teaser.jpg?w=1200 1200w\" alt=\"\" width=\"640\" height=\"334\" data-recalc-dims=\"1\" \/><\/h3>\n<h3 style=\"text-align: center;\"><strong><a href=\"http:\/\/soarexpert.com\/wp-content\/uploads\/2019\/12\/DDoS.pdf\">Download DDoS Playbook<\/a><a role=\"button\" href=\"#\"><br \/><\/a><\/strong><\/h3>\n<h3 style=\"text-align: center;\"><br \/><img loading=\"lazy\" class=\"aligncenter\" src=\"https:\/\/i0.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/12\/ransomware-2321110_1920.jpg?resize=640%2C424\" sizes=\"(max-width: 640px) 100vw, 640px\" srcset=\"https:\/\/i0.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/12\/ransomware-2321110_1920.jpg?resize=1024%2C678 1024w, https:\/\/i0.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/12\/ransomware-2321110_1920.jpg?resize=300%2C199 300w, https:\/\/i0.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/12\/ransomware-2321110_1920.jpg?resize=768%2C508 768w, https:\/\/i0.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/12\/ransomware-2321110_1920.jpg?resize=1536%2C1017 1536w, https:\/\/i0.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/12\/ransomware-2321110_1920.jpg?w=1920 1920w, https:\/\/i0.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/12\/ransomware-2321110_1920.jpg?w=1280 1280w\" alt=\"\" width=\"640\" height=\"424\" data-recalc-dims=\"1\" \/><\/h3>\n<h3 style=\"text-align: center;\"><strong><a href=\"http:\/\/soarexpert.com\/wp-content\/uploads\/2019\/12\/Data_Theft.pdf\">Download Data Theft Playbook<\/a><a role=\"button\" href=\"#\"><br \/><\/a><\/strong><\/h3>\n<p><a role=\"button\" href=\"#\"><br \/><\/a><br \/><img loading=\"lazy\" class=\"aligncenter\" src=\"https:\/\/i0.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/12\/imageprivilege.png?resize=619%2C497\" sizes=\"(max-width: 619px) 100vw, 619px\" srcset=\"https:\/\/i0.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/12\/imageprivilege.png?w=619 619w, https:\/\/i0.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/12\/imageprivilege.png?resize=300%2C241 300w\" alt=\"\" width=\"619\" height=\"497\" data-recalc-dims=\"1\" \/><\/p>\n<h3 style=\"text-align: center;\"><strong><a href=\"http:\/\/soarexpert.com\/wp-content\/uploads\/2019\/12\/Elevation-of-Privilege.pdf\">Download Elevation of Privilege Playbook<\/a><a role=\"button\" href=\"#\"><br \/><\/a><\/strong><br \/><img loading=\"lazy\" class=\"aligncenter\" src=\"https:\/\/i0.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/12\/root-1-696x435-1.jpg?resize=640%2C400\" sizes=\"(max-width: 640px) 100vw, 640px\" srcset=\"https:\/\/i1.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/12\/root-1-696x435-1.jpg?w=696 696w, https:\/\/i1.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/12\/root-1-696x435-1.jpg?resize=300%2C188 300w\" alt=\"\" width=\"640\" height=\"400\" data-recalc-dims=\"1\" \/><\/h3>\n<h3 style=\"text-align: center;\"><strong><a href=\"http:\/\/soarexpert.com\/wp-content\/uploads\/2019\/12\/Root-Access.pdf\">Download Root Access Playbook<\/a><\/strong><a role=\"button\" href=\"#\"><br \/><br \/><\/a><br \/><img loading=\"lazy\" class=\"aligncenter\" src=\"https:\/\/i0.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/12\/cyberattack_120718istock.jpg?resize=640%2C360\" sizes=\"(max-width: 640px) 100vw, 640px\" srcset=\"https:\/\/i0.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/12\/cyberattack_120718istock.jpg?w=645 645w, https:\/\/i0.wp.com\/soarexpert.com\/wp-content\/uploads\/2019\/12\/cyberattack_120718istock.jpg?resize=300%2C169 300w\" alt=\"\" width=\"640\" height=\"360\" data-recalc-dims=\"1\" \/><\/h3>\n<h3 style=\"text-align: center;\"><strong><a href=\"http:\/\/soarexpert.com\/wp-content\/uploads\/2019\/12\/ImproperComputerUsage.pdf\">Download Improper Usage Playbook<\/a><\/strong><\/h3>\n<h3>\u00a0<\/h3>\n<h3 style=\"text-align: center;\"><a target=\"_blank\" rel=\"noopener noreferrer\">\u00a0<\/a><\/h3>\n\n\n<p>Contact with us for tailor made playbooks<\/p>\n\n\n<div class=\"wpforms-container wpforms-container-full\" id=\"wpforms-223\"><form id=\"wpforms-form-223\" class=\"wpforms-validate wpforms-form\" data-formid=\"223\" method=\"post\" enctype=\"multipart\/form-data\" action=\"\/index.php\/wp-json\/wp\/v2\/pages\/18\" data-token=\"18ddd4c7257402c786d690394fffd9a9\"><noscript class=\"wpforms-error-noscript\">Please enable JavaScript in your browser to complete this form.<\/noscript><div class=\"wpforms-field-container\"><div id=\"wpforms-223-field_0-container\" class=\"wpforms-field wpforms-field-name\" data-field-id=\"0\"><label class=\"wpforms-field-label\" for=\"wpforms-223-field_0\">Name <span class=\"wpforms-required-label\">*<\/span><\/label><input type=\"text\" id=\"wpforms-223-field_0\" class=\"wpforms-field-medium wpforms-field-required\" name=\"wpforms[fields][0]\" required><\/div><div id=\"wpforms-223-field_1-container\" class=\"wpforms-field wpforms-field-email\" data-field-id=\"1\"><label class=\"wpforms-field-label\" for=\"wpforms-223-field_1\">Email <span class=\"wpforms-required-label\">*<\/span><\/label><input type=\"email\" id=\"wpforms-223-field_1\" class=\"wpforms-field-medium wpforms-field-required\" name=\"wpforms[fields][1]\" required><\/div><div id=\"wpforms-223-field_2-container\" class=\"wpforms-field wpforms-field-textarea\" data-field-id=\"2\"><label class=\"wpforms-field-label\" for=\"wpforms-223-field_2\">Comment or Message <span class=\"wpforms-required-label\">*<\/span><\/label><textarea id=\"wpforms-223-field_2\" class=\"wpforms-field-small wpforms-field-required\" name=\"wpforms[fields][2]\" required><\/textarea><\/div><\/div><div class=\"wpforms-field wpforms-field-hp\"><label for=\"wpforms-223-field-hp\" class=\"wpforms-field-label\">Website<\/label><input type=\"text\" name=\"wpforms[hp]\" id=\"wpforms-223-field-hp\" class=\"wpforms-field-medium\"><\/div><div class=\"wpforms-submit-container\"><input type=\"hidden\" name=\"wpforms[id]\" value=\"223\"><input type=\"hidden\" name=\"wpforms[author]\" value=\"1\"><button type=\"submit\" name=\"wpforms[submit]\" id=\"wpforms-submit-223\" class=\"wpforms-submit\" data-alt-text=\"Sending...\" data-submit-text=\"Submit\" aria-live=\"assertive\" value=\"wpforms-submit\">Submit<\/button><\/div><\/form><\/div>  <!-- .wpforms-container -->","protected":false},"excerpt":{"rendered":"<p>Download Phishing Playbook Download Malware Outbreak Playbook Download Unauthorized Access Playbook Download Virus Outbreak Playbook Download DDoS Playbook Download Data Theft Playbook Download Elevation of Privilege Playbook Download Root Access Playbook Download Improper Usage Playbook \u00a0 \u00a0 Contact with us for tailor made playbooks<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"spay_email":""},"_links":{"self":[{"href":"https:\/\/soarexpert.com\/index.php\/wp-json\/wp\/v2\/pages\/18"}],"collection":[{"href":"https:\/\/soarexpert.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/soarexpert.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/soarexpert.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/soarexpert.com\/index.php\/wp-json\/wp\/v2\/comments?post=18"}],"version-history":[{"count":20,"href":"https:\/\/soarexpert.com\/index.php\/wp-json\/wp\/v2\/pages\/18\/revisions"}],"predecessor-version":[{"id":327,"href":"https:\/\/soarexpert.com\/index.php\/wp-json\/wp\/v2\/pages\/18\/revisions\/327"}],"wp:attachment":[{"href":"https:\/\/soarexpert.com\/index.php\/wp-json\/wp\/v2\/media?parent=18"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}