Practical Threat Intelligence and Data-Driven Threat Hunting

Practical Threat Intelligence and Data-Driven Threat Hunting
Author :
Publisher : Packt Publishing Ltd
Total Pages : 398
Release :
ISBN-10 : 9781838551636
ISBN-13 : 1838551638
Rating : 4/5 (638 Downloads)

Book Synopsis Practical Threat Intelligence and Data-Driven Threat Hunting by : Valentina Costa-Gazcón

Download or read book Practical Threat Intelligence and Data-Driven Threat Hunting written by Valentina Costa-Gazcón and published by Packt Publishing Ltd. This book was released on 2021-02-12 with total page 398 pages. Available in PDF, EPUB and Kindle. Book excerpt: Get to grips with cyber threat intelligence and data-driven threat hunting while exploring expert tips and techniques Key Features Set up an environment to centralize all data in an Elasticsearch, Logstash, and Kibana (ELK) server that enables threat hunting Carry out atomic hunts to start the threat hunting process and understand the environment Perform advanced hunting using MITRE ATT&CK Evals emulations and Mordor datasets Book DescriptionThreat hunting (TH) provides cybersecurity analysts and enterprises with the opportunity to proactively defend themselves by getting ahead of threats before they can cause major damage to their business. This book is not only an introduction for those who don’t know much about the cyber threat intelligence (CTI) and TH world, but also a guide for those with more advanced knowledge of other cybersecurity fields who are looking to implement a TH program from scratch. You will start by exploring what threat intelligence is and how it can be used to detect and prevent cyber threats. As you progress, you’ll learn how to collect data, along with understanding it by developing data models. The book will also show you how to set up an environment for TH using open source tools. Later, you will focus on how to plan a hunt with practical examples, before going on to explore the MITRE ATT&CK framework. By the end of this book, you’ll have the skills you need to be able to carry out effective hunts in your own environment.What you will learn Understand what CTI is, its key concepts, and how it is useful for preventing threats and protecting your organization Explore the different stages of the TH process Model the data collected and understand how to document the findings Simulate threat actor activity in a lab environment Use the information collected to detect breaches and validate the results of your queries Use documentation and strategies to communicate processes to senior management and the wider business Who this book is for If you are looking to start out in the cyber intelligence and threat hunting domains and want to know more about how to implement a threat hunting division with open-source tools, then this cyber threat intelligence book is for you.


Practical Threat Intelligence and Data-Driven Threat Hunting Related Books

Practical Threat Intelligence and Data-Driven Threat Hunting
Language: en
Pages: 398
Authors: Valentina Costa-Gazcón
Categories: Computers
Type: BOOK - Published: 2021-02-12 - Publisher: Packt Publishing Ltd

GET EBOOK

Get to grips with cyber threat intelligence and data-driven threat hunting while exploring expert tips and techniques Key Features Set up an environment to cent
Study Guide to Threat Hunting
Language: en
Pages: 226
Authors: Cybellium
Categories: Computers
Type: BOOK - Published: - Publisher: Cybellium Ltd

GET EBOOK

Welcome to the forefront of knowledge with Cybellium, your trusted partner in mastering the cutting-edge fields of IT, Artificial Intelligence, Cyber Security,
Threat Hunting with Elastic Stack
Language: en
Pages: 392
Authors: Andrew Pease
Categories: Computers
Type: BOOK - Published: 2021-07-23 - Publisher: Packt Publishing Ltd

GET EBOOK

Learn advanced threat analysis techniques in practice by implementing Elastic Stack security features Key FeaturesGet started with Elastic Security configuratio
Zero Trust Networks
Language: en
Pages: 240
Authors: Evan Gilman
Categories: Computers
Type: BOOK - Published: 2017-06-19 - Publisher: "O'Reilly Media, Inc."

GET EBOOK

The perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind the firewall have no defenses of their own, so when a host in
Applied Network Security Monitoring
Language: en
Pages: 497
Authors: Chris Sanders
Categories: Computers
Type: BOOK - Published: 2013-11-26 - Publisher: Elsevier

GET EBOOK

Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complet