The foundations of threat hunting organize and design effective cyber threat hunts to meet business needs
Build and mature a threat hunting team capable of repeatably stalking and trapping advanced adversaries in the darkest parts of an enterprise Key Features Learn foundational concepts for effective threat hunting teams in pursuit of cyber adversaries Recognize processes and requirements for executing...
Otros Autores: | , , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Birmingham, UK :
Packt Publishing
[2022]
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009668694106719 |
Tabla de Contenidos:
- Table of Contents An Introduction to Threat Hunting Requirements and Motivations Team Construct Communication Breakdown Methodologies Threat Intelligence Planning Defending the Defenders Hardware and Toolsets Data Analysis Documentation Deliverables Post-Hunt Activity and Maturing A Team Appendix.