Incident Response With Threat Intelligence
(eBook)

Book Cover
Your Rating: 0 stars
Star rating for

Contributors:
Published:
[United States] : Packt Publishing, 2022.
Format:
eBook
Content Description:
1 online resource (468 pages)
Status:

Description

With constantly evolving cyber threats, developing a cybersecurity incident response capability to identify and contain threats is indispensable for any organization regardless of its size. This book covers theoretical concepts and a variety of real-life scenarios that will help you to apply these concepts within your organization. Starting with the basics of incident response, the book introduces you to professional practices and advanced concepts for integrating threat hunting and threat intelligence procedures in the identification, contention, and eradication stages of the incident response cycle. As you progress through the chapters, you'll cover the different aspects of developing an incident response program. You'll learn the implementation and use of platforms such as TheHive and ELK and tools for evidence collection such as Velociraptor and KAPE before getting to grips with the integration of frameworks such as Cyber Kill Chain and MITRE ATT&CK for analysis and investigation. You'll also explore methodologies and tools for cyber threat hunting with Sigma and YARA rules. By the end of this book, you'll have learned everything you need to respond to cybersecurity incidents using threat intelligence.

Also in This Series

More Like This

More Details

Language:
Unknown
ISBN:
9781801070997, 1801070997

Notes

Restrictions on Access
Instant title available through hoopla.
Description
With constantly evolving cyber threats, developing a cybersecurity incident response capability to identify and contain threats is indispensable for any organization regardless of its size. This book covers theoretical concepts and a variety of real-life scenarios that will help you to apply these concepts within your organization. Starting with the basics of incident response, the book introduces you to professional practices and advanced concepts for integrating threat hunting and threat intelligence procedures in the identification, contention, and eradication stages of the incident response cycle. As you progress through the chapters, you'll cover the different aspects of developing an incident response program. You'll learn the implementation and use of platforms such as TheHive and ELK and tools for evidence collection such as Velociraptor and KAPE before getting to grips with the integration of frameworks such as Cyber Kill Chain and MITRE ATT&CK for analysis and investigation. You'll also explore methodologies and tools for cyber threat hunting with Sigma and YARA rules. By the end of this book, you'll have learned everything you need to respond to cybersecurity incidents using threat intelligence.
System Details
Mode of access: World Wide Web.

Reviews from GoodReads

Loading GoodReads Reviews.

Citations

APA Citation (style guide)

Martinez, R. (2022). Incident Response With Threat Intelligence. Packt Publishing.

Chicago / Turabian - Author Date Citation (style guide)

Martinez, Roberto. 2022. Incident Response With Threat Intelligence. Packt Publishing.

Chicago / Turabian - Humanities Citation (style guide)

Martinez, Roberto, Incident Response With Threat Intelligence. Packt Publishing, 2022.

MLA Citation (style guide)

Martinez, Roberto. Incident Response With Threat Intelligence. Packt Publishing, 2022.

Note! Citation formats are based on standards as of July 2022. Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy.

Staff View

Grouped Work ID:
465a5062-9865-8076-2e7c-abb3490f665d
Go To Grouped Work

Hoopla Extract Information

hooplaId17581936
titleIncident Response With Threat Intelligence
languageENGLISH
kindEBOOK
series
season
publisherPackt Publishing
price1.35
active1
pa
profanity
children
demo
duration
rating
abridged
fiction
purchaseModelINSTANT
dateLastUpdatedDec 11, 2024 06:19:14 PM

Record Information

Last File Modification TimeMay 02, 2025 11:33:43 PM
Last Grouped Work Modification TimeMay 02, 2025 10:24:25 PM

MARC Record

LEADER02834nam a22004455i 4500
001MWT17581936
003MWT
00520250419124106.0
006m     o  d        
007cr cn|||||||||
008250419s2022    xxu    eo     000 0 eng d
020 |a 9781801070997 |q (electronic bk.)
020 |a 1801070997 |q (electronic bk.)
02842 |a MWT17581936
029 |a https://d2snwnmzyr8jue.cloudfront.net/dra_9781801070997_180.jpeg
037 |a 17581936 |b Midwest Tape, LLC |n http://www.midwesttapes.com
040 |a Midwest |e rda
099 |a eBook hoopla
1001 |a Martinez, Roberto, |e author.
24510 |a Incident Response With Threat Intelligence |h [electronic resource] / |c Roberto Martinez.
2641 |a [United States] : |b Packt Publishing, |c 2022.
2642 |b Made available through hoopla
300 |a 1 online resource (468 pages)
336 |a text |b txt |2 rdacontent
337 |a computer |b c |2 rdamedia
338 |a online resource |b cr |2 rdacarrier
347 |a text file |2 rda
506 |a Instant title available through hoopla.
520 |a With constantly evolving cyber threats, developing a cybersecurity incident response capability to identify and contain threats is indispensable for any organization regardless of its size. This book covers theoretical concepts and a variety of real-life scenarios that will help you to apply these concepts within your organization. Starting with the basics of incident response, the book introduces you to professional practices and advanced concepts for integrating threat hunting and threat intelligence procedures in the identification, contention, and eradication stages of the incident response cycle. As you progress through the chapters, you'll cover the different aspects of developing an incident response program. You'll learn the implementation and use of platforms such as TheHive and ELK and tools for evidence collection such as Velociraptor and KAPE before getting to grips with the integration of frameworks such as Cyber Kill Chain and MITRE ATT&CK for analysis and investigation. You'll also explore methodologies and tools for cyber threat hunting with Sigma and YARA rules. By the end of this book, you'll have learned everything you need to respond to cybersecurity incidents using threat intelligence.
538 |a Mode of access: World Wide Web.
6500 |a Computer networks |x Security measures.
6500 |a Computer security.
6500 |a Computers.
6500 |a Cryptography.
6500 |a Internet |x Safety measures.
6500 |a Internet.
6500 |a Electronic books.
7102 |a hoopla digital.
85640 |u https://www.hoopladigital.com/title/17581936?utm_source=MARC&Lid=hh4435 |z Instantly available on hoopla.
85642 |z Cover image |u https://d2snwnmzyr8jue.cloudfront.net/dra_9781801070997_180.jpeg