1. Collection
  2. Endpoint
  3. Enrichment
  4. Malware
  5. Phishing
  6. Response
  7. Utility