Practical Threat Intelligence and Data-Driven Threat Hunting

Practical Threat Intelligence and Data-Driven Threat Hunting
Author :
Publisher : Packt Publishing Ltd
Total Pages : 398
Release :
ISBN-10 : 9781838551636
ISBN-13 : 1838551638
Rating : 4/5 (36 Downloads)

Book Synopsis Practical Threat Intelligence and Data-Driven Threat Hunting by : Valentina Costa-Gazcón

Download or read book Practical Threat Intelligence and Data-Driven Threat Hunting written by Valentina Costa-Gazcón and published by Packt Publishing Ltd. This book was released on 2021-02-12 with total page 398 pages. Available in PDF, EPUB and Kindle. Book excerpt: Get to grips with cyber threat intelligence and data-driven threat hunting while exploring expert tips and techniques Key Features Set up an environment to centralize all data in an Elasticsearch, Logstash, and Kibana (ELK) server that enables threat hunting Carry out atomic hunts to start the threat hunting process and understand the environment Perform advanced hunting using MITRE ATT&CK Evals emulations and Mordor datasets Book DescriptionThreat hunting (TH) provides cybersecurity analysts and enterprises with the opportunity to proactively defend themselves by getting ahead of threats before they can cause major damage to their business. This book is not only an introduction for those who don’t know much about the cyber threat intelligence (CTI) and TH world, but also a guide for those with more advanced knowledge of other cybersecurity fields who are looking to implement a TH program from scratch. You will start by exploring what threat intelligence is and how it can be used to detect and prevent cyber threats. As you progress, you’ll learn how to collect data, along with understanding it by developing data models. The book will also show you how to set up an environment for TH using open source tools. Later, you will focus on how to plan a hunt with practical examples, before going on to explore the MITRE ATT&CK framework. By the end of this book, you’ll have the skills you need to be able to carry out effective hunts in your own environment.What you will learn Understand what CTI is, its key concepts, and how it is useful for preventing threats and protecting your organization Explore the different stages of the TH process Model the data collected and understand how to document the findings Simulate threat actor activity in a lab environment Use the information collected to detect breaches and validate the results of your queries Use documentation and strategies to communicate processes to senior management and the wider business Who this book is for If you are looking to start out in the cyber intelligence and threat hunting domains and want to know more about how to implement a threat hunting division with open-source tools, then this cyber threat intelligence book is for you.


Practical Threat Intelligence and Data-Driven Threat Hunting Related Books

Practical Threat Intelligence and Data-Driven Threat Hunting
Language: en
Pages: 398
Authors: Valentina Costa-Gazcón
Categories: Computers
Type: BOOK - Published: 2021-02-12 - Publisher: Packt Publishing Ltd

DOWNLOAD EBOOK

Get to grips with cyber threat intelligence and data-driven threat hunting while exploring expert tips and techniques Key Features Set up an environment to cent
Threat Hunting with Elastic Stack
Language: en
Pages: 392
Authors: Andrew Pease
Categories: Computers
Type: BOOK - Published: 2021-07-23 - Publisher: Packt Publishing Ltd

DOWNLOAD EBOOK

Learn advanced threat analysis techniques in practice by implementing Elastic Stack security features Key FeaturesGet started with Elastic Security configuratio
Threat Hunting in the Cloud
Language: en
Pages: 647
Authors: Chris Peiris
Categories: Computers
Type: BOOK - Published: 2021-08-31 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

Implement a vendor-neutral and multi-cloud cybersecurity and risk mitigation framework with advice from seasoned threat hunting pros In Threat Hunting in the Cl
Intelligence-Driven Incident Response
Language: en
Pages: 286
Authors: Scott J Roberts
Categories: Computers
Type: BOOK - Published: 2017-08-21 - Publisher: "O'Reilly Media, Inc."

DOWNLOAD EBOOK

Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate.
Open Source Intelligence Methods and Tools
Language: en
Pages: 371
Authors: Nihad A. Hassan
Categories: Computers
Type: BOOK - Published: 2018-06-30 - Publisher: Apress

DOWNLOAD EBOOK

Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence