تصویر انتخاب شده
نمایش بیشتر
تصاویر بیشتر

کتاب Practical Threat Intelligence and Data-Driven Threat Hunting

0
فروشگاه آنور آذربایجان شرقی
ویژگی های محصول
تعداد صفحه: 398 زبان : انگلیسی تاریخ انتشار:February 12, 2021
متاسفانه فعلا موجود نیست!
متاسفانه فعلا موجود نیست!
مشخصات
سایز 19*2.3*23.5
دوام کبفبت چاپ بالا
جنس کتاب
وزن 680

توضیحات

ارسال کتاب های زبان اصلی در بازه 8 الی 12 روزه انجام میشود.
-----------------------------------------------------------------------------------------
https://www.amazon.com/Practical-Threat-Hunting/dp/1838556370
=======================================================
Practical Threat Intelligence and Data-Driven Threat Hunting

by Valentina Costa-Gazcón (Author)
Key Features
Set up an environment to centralize all data in an Elasticsearch, Logstash, and Kibana (ELK) server that enables threat hunting
Carry out atomic hunts to start the threat hunting process and understand the environment
Perform advanced hunting using MITRE ATT&CK Evals emulations and Mordor datasets
Book Description
Threat hunting (TH) provides cybersecurity analysts and enterprises with the opportunity to proactively defend themselves by getting ahead of threats before they can cause major damage to their business.

This book is not only an introduction for those who don’t know much about the cyber threat intelligence (CTI) and TH world, but also a guide for those with more advanced knowledge of other cybersecurity fields who are looking to implement a TH program from scratch.

You will start by exploring what threat intelligence is and how it can be used to detect and prevent cyber threats. As you progress, you’ll learn how to collect data, along with understanding it by developing data models. The book will also show you how to set up an environment for TH using open source tools. Later, you will focus on how to plan a hunt with practical examples, before going on to explore the MITRE ATT&CK framework.

By the end of this book, you’ll have the skills you need to be able to carry out effective hunts in your own environment.

What you will learn
Understand what CTI is, its key concepts, and how it is useful for preventing threats and protecting your organization
Explore the different stages of the TH process
Model the data collected and understand how to document the findings
Simulate threat actor activity in a lab environment

ابتدا وارد حساب خود شوید و بعد نظراتتان را با ما به اشتراک بگذارید!
ورود

نظرات

محصولات پیشنهادی برای شما
مشاهده همه
ورود به حساب آنور

ابتدا وارد حساب خود شوید!

ورود به حساب

این کالا به سبد خرید شما اضافه شد!

مشاهده سبد خرید

مشاهده لیست

ثبت نظر

کتاب Practical Threat Intelligence and Data-Driven Threat Hunting

فروشگاه آنور | آذربایجان شرقی

ثبت امتیاز

حداکثر ۳ تصویر (هر کدام تا ۵ مگابایت):

اشتراک گذاری