The foundations of threat hunting organize and design effective cyber threat hunts to meet business needs

Build and mature a threat hunting team capable of repeatably stalking and trapping advanced adversaries in the darkest parts of an enterprise Key Features Learn foundational concepts for effective threat hunting teams in pursuit of cyber adversaries Recognize processes and requirements for executing...

Full description

Bibliographic Details
Other Authors: Maurice, Chad, author (author), Copeland, William, author, Thompson, Jeremy, author
Format: eBook
Language:Inglés
Published: Birmingham, UK : Packt Publishing [2022]
Subjects:
See on Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009668694106719
Table of Contents:
  • Table of Contents An Introduction to Threat Hunting Requirements and Motivations Team Construct Communication Breakdown Methodologies Threat Intelligence Planning Defending the Defenders Hardware and Toolsets Data Analysis Documentation Deliverables Post-Hunt Activity and Maturing A Team Appendix.