Nadhem AlFardan - Böcker
420 kr
Skickas inom 7-10 vardagar
Follow the clues, track down the bad actors trying to access your systems, and uncover the chain of evidence left by even the most careful adversary.
For security, network, and systems professionals familiar with security tools and Python.
Cyber Threat Hunting is a practical guide to the subject, that will teach you how to identify attempts to access your systems by spotting the clues your adversaries leave behind. The book lays the path to becoming a successful cyber security threat hunter, guiding you from your very first expedition to hunting in complex cloud-native environments.
Key features include:
Design and implement a cyber threat-hunting framework Think like your adversaries Conduct threat-hunting expeditions Streamline how you work with other cybersecurity teams Structure threat hunting expeditions without losing track of activities and clues Use statistics and machine learning techniques to hunt threatsThe organisations that actively seek out security intrusions reduce the time bad actors spend on their sites, increase their cyber resilience, and build strong resistance to sophisticated covert threats. Cyber Threat Hunting gives a reliable and repeatable framework to see and stop attacks.
About the technology
There is no question about whether your security will come under attack. It already is. The real question is whether you will identify and learn from the attacks, when they occur. Cyber threat hunting assumes that a system has been hacked and reveals the signs that have evaded detection tools or been dismissed as unimportant. In the constantly evolving landscape of modern security, threat hunting is a vital practice to avoid complacency and harden your defences against attack.
371 kr
Skickas inom 7-10 vardagar
Security Operations Center
Building, Operating, and Maintaining Your SOC
The complete, practical guide to planning, building, and operating an effective Security Operations Center (SOC)
Security Operations Center is the complete guide to building, operating, and managing Security Operations Centers in any environment. Drawing on experience with hundreds of customers ranging from Fortune 500 enterprises to large military organizations, three leading experts thoroughly review each SOC model, including virtual SOCs. You’ll learn how to select the right strategic option for your organization, and then plan and execute the strategy you’ve chosen.
Security Operations Center walks you through every phase required to establish and run an effective SOC, including all significant people, process, and technology capabilities. The authors assess SOC technologies, strategy, infrastructure, governance, planning, implementation, and more. They take a holistic approach considering various commercial and open-source tools found in modern SOCs.
This best-practice guide is written for anybody interested in learning how to develop, manage, or improve a SOC. A background in network security, management, and operations will be helpful but is not required. It is also an indispensable resource for anyone preparing for the Cisco SCYBER exam.
· Review high-level issues, such as vulnerability and risk management, threat intelligence, digital investigation, and data collection/analysis
· Understand the technical components of a modern SOC
· Assess the current state of your SOC and identify areas of improvement
· Plan SOC strategy, mission, functions, and services
· Design and build out SOC infrastructure, from facilities and networks to systems, storage, and physical security
· Collect and successfully analyze security data
· Establish an effective vulnerability management practice
· Organize incident response teams and measure their performance
· Define an optimal governance and staffing model
· Develop a practical SOC handbook that people can actually use
· Prepare SOC to go live, with comprehensive transition plans
· React quickly and collaboratively to security incidents
· Implement best practice security operations, including continuous enhancement and improvement