The foundations of threat hunting organize and design effective cyber threat hunts to meet business needs
Build and mature a threat hunting team capable of repeatably stalking and trapping advanced adversaries in the darkest parts of an enterprise Key Features Learn foundational concepts for effective threat hunting teams in pursuit of cyber adversaries Recognize processes and requirements for executing...
Other Authors: | , , |
---|---|
Format: | eBook |
Language: | Inglés |
Published: |
Birmingham, UK :
Packt Publishing
[2022]
|
Subjects: | |
See on Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009668694106719 |
Table of Contents:
- Table of Contents An Introduction to Threat Hunting Requirements and Motivations Team Construct Communication Breakdown Methodologies Threat Intelligence Planning Defending the Defenders Hardware and Toolsets Data Analysis Documentation Deliverables Post-Hunt Activity and Maturing A Team Appendix.