|
Showing 1 - 2 of
2 matches in All Departments
Learn cyber threat intelligence fundamentals to implement and
operationalize an organizational intelligence program Key Features
Develop and implement a threat intelligence program from scratch
Discover techniques to perform cyber threat intelligence,
collection, and analysis using open-source tools Leverage a
combination of theory and practice that will help you prepare a
solid foundation for operationalizing threat intelligence programs
Book DescriptionWe're living in an era where cyber threat
intelligence is becoming more important. Cyber threat intelligence
routinely informs tactical and strategic decision-making throughout
organizational operations. However, finding the right resources on
the fundamentals of operationalizing a threat intelligence function
can be challenging, and that's where this book helps. In
Operationalizing Threat Intelligence, you'll explore cyber threat
intelligence in five fundamental areas: defining threat
intelligence, developing threat intelligence, collecting threat
intelligence, enrichment and analysis, and finally production of
threat intelligence. You'll start by finding out what threat
intelligence is and where it can be applied. Next, you'll discover
techniques for performing cyber threat intelligence collection and
analysis using open source tools. The book also examines commonly
used frameworks and policies as well as fundamental operational
security concepts. Later, you'll focus on enriching and analyzing
threat intelligence through pivoting and threat hunting. Finally,
you'll examine detailed mechanisms for the production of
intelligence. By the end of this book, you'll be equipped with the
right tools and understand what it takes to operationalize your own
threat intelligence function, from collection to production. What
you will learn Discover types of threat actors and their common
tactics and techniques Understand the core tenets of cyber threat
intelligence Discover cyber threat intelligence policies,
procedures, and frameworks Explore the fundamentals relating to
collecting cyber threat intelligence Understand fundamentals about
threat intelligence enrichment and analysis Understand what threat
hunting and pivoting are, along with examples Focus on putting
threat intelligence into production Explore techniques for
performing threat analysis, pivoting, and hunting Who this book is
forThis book is for cybersecurity professionals, security analysts,
security enthusiasts, and anyone who is just getting started and
looking to explore threat intelligence in more detail. Those
working in different security roles will also be able to explore
threat intelligence with the help of this security book.
Learn to defend crucial ICS/SCADA infrastructure from devastating
attacks the tried-and-true Hacking Exposed way This practical guide
reveals the powerful weapons and devious methods cyber-terrorists
use to compromise the devices, applications, and systems vital to
oil and gas pipelines, electrical grids, and nuclear refineries.
Written in the battle-tested Hacking Exposed style, the book arms
you with the skills and tools necessary to defend against attacks
that are debilitating-and potentially deadly. Hacking Exposed
Industrial Control Systems: ICS and SCADA Security Secrets &
Solutions explains vulnerabilities and attack vectors specific to
ICS/SCADA protocols, applications, hardware, servers, and
workstations. You will learn how hackers and malware, such as the
infamous Stuxnet worm, can exploit them and disrupt critical
processes, compromise safety, and bring production to a halt. The
authors fully explain defense strategies and offer ready-to-deploy
countermeasures. Each chapter features a real-world case study as
well as notes, tips, and cautions. Features examples, code samples,
and screenshots of ICS/SCADA-specific attacks Offers step-by-step
vulnerability assessment and penetration test instruction Written
by a team of ICS/SCADA security experts and edited by Hacking
Exposed veteran Joel Scambray
|
You may like...
Not available
Ab Wheel
R209
R149
Discovery Miles 1 490
|