reklama - zainteresowany?

Effective Threat Investigation for SOC Analysts. The ultimate guide to examining various threats and attacker techniques using security logs - Helion

Effective Threat Investigation for SOC Analysts. The ultimate guide to examining various threats and attacker techniques using security logs
ebook
Autor: Mostafa Yahia
Tytuł oryginału: Effective Threat Investigation for SOC Analysts. The ultimate guide to examining various threats and attacker techniques using security logs
ISBN: 9781837638758
stron: 314, Format: ebook
Data wydania: 2023-08-25
Księgarnia: Helion

Cena książki: 161,10 zł (poprzednio: 179,00 zł)
Oszczędzasz: 10% (-17,90 zł)

Dodaj do koszyka Effective Threat Investigation for SOC Analysts. The ultimate guide to examining various threats and attacker techniques using security logs

Effective threat investigation requires strong technical expertise, analytical skills, and a deep understanding of cyber threats and attacker techniques. It's a crucial skill for SOC analysts, enabling them to analyze different threats and identify security incident origins. This book provides insights into the most common cyber threats and various attacker techniques to help you hone your incident investigation skills.
The book begins by explaining phishing and email attack types and how to detect and investigate them, along with Microsoft log types such as Security, System, PowerShell, and their events. Next, you’ll learn how to detect and investigate attackers' techniques and malicious activities within Windows environments. As you make progress, you’ll find out how to analyze the firewalls, flows, and proxy logs, as well as detect and investigate cyber threats using various security solution alerts, including EDR, IPS, and IDS. You’ll also explore popular threat intelligence platforms such as VirusTotal, AbuseIPDB, and X-Force for investigating cyber threats and successfully build your own sandbox environment for effective malware analysis.
By the end of this book, you’ll have learned how to analyze popular systems and security appliance logs that exist in any environment and explore various attackers' techniques to detect and investigate them with ease.

Dodaj do koszyka Effective Threat Investigation for SOC Analysts. The ultimate guide to examining various threats and attacker techniques using security logs

 

Osoby które kupowały "Effective Threat Investigation for SOC Analysts. The ultimate guide to examining various threats and attacker techniques using security logs", wybierały także:

  • Windows Media Center. Domowe centrum rozrywki
  • Ruby on Rails. Ćwiczenia
  • Przywództwo w Å›wiecie VUCA. Jak być skutecznym liderem w niepewnym Å›rodowisku
  • Scrum. O zwinnym zarzÄ…dzaniu projektami. Wydanie II rozszerzone
  • Od hierarchii do turkusu, czyli jak zarzÄ…dzać w XXI wieku

Dodaj do koszyka Effective Threat Investigation for SOC Analysts. The ultimate guide to examining various threats and attacker techniques using security logs

Spis treści

Effective Threat Investigation for SOC Analysts. The ultimate guide to examining various threats and attacker techniques using security logs eBook -- spis treści

  • 1. Investigating Email Threats
  • 2. Email Flow and Header Analysis
  • 3. Introduction to Windows Event Logs
  • 4. Tracking Accounts Login and Management
  • 5. Investigating Suspicious Process Execution Using Windows Event Logs
  • 6. Investigating PowerShell Event Logs
  • 7. Investigating Persistence and Lateral Movement Using Windows Event Logs
  • 8. Network Firewall Logs Analysis
  • 9. Investigating Cyber Threats by Using the Firewall Logs
  • 10. Web Proxy Logs Analysis
  • 11. Investigating Suspicious Outbound Communications (C&C Communications) by Using Proxy Logs
  • 12. Investigating External Threats
  • 13. Investigating Network Flows and Security Solutions Alerts
  • 14. Threat Intelligence in a SOC Analyst's Day
  • 15. Malware Sandboxing – Building a Malware Sandbox

Dodaj do koszyka Effective Threat Investigation for SOC Analysts. The ultimate guide to examining various threats and attacker techniques using security logs

Code, Publish & WebDesing by CATALIST.com.pl



(c) 2005-2025 CATALIST agencja interaktywna, znaki firmowe należą do wydawnictwa Helion S.A.