Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Start tilbuddet
DK - Details page - Device banner - 894x1036

Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs

Længde
11T 43M
Sprog
Engelsk
Format
Kategori

Fakta

We’re living in an era where cyber threat intelligence is becoming more important. Cyber threat intelligence routinely informs tactical and strategic decision-making throughout organizational operations. However, finding the right resources on the fundamentals of operationalizing a threat intelligence function can be challenging, and that’s where this book helps.

In Operationalizing Threat Intelligence, you’ll explore cyber threat intelligence in five fundamental areas: defining threat intelligence, developing threat intelligence, collecting threat intelligence, enrichment and analysis, and finally production of threat intelligence. You’ll start by finding out what threat intelligence is and where it can be applied. Next, you’ll discover techniques for performing cyber threat intelligence collection and analysis using open source tools. The book also examines commonly used frameworks and policies as well as fundamental operational security concepts. Later, you’ll focus on enriching and analyzing threat intelligence through pivoting and threat hunting. Finally, you’ll examine detailed mechanisms for the production of intelligence.

By the end of this book, you’ll be equipped with the right tools and understand what it takes to operationalize your own threat intelligence function, from collection to production.

© 2022 Packt Publishing (Lydbog): 9781837632879
© 2022 Packt Publishing (E-bog): 9781801818667

Release date

Lydbog: 30. december 2022
E-bog: 17. juni 2022

Tags

    Andre kan også lide...

    1. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
    2. Cybersecutity First Principles Rick Howard
    3. Cybersecurity For Dummies Joseph Steinberg
    4. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
    5. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
    6. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
    7. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
    8. Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
    9. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
    10. Cloud Security For Dummies Ted Coombs
    11. Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career Dr. Gerald Auger
    12. The Art of Deception: Controlling the Human Element of Security William L. Simon
    13. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
    14. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
    15. Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
    16. If It's Smart, It's Vulnerable Mikko Hypponen
    17. Cybersecurity and Cyberwar: What Everyone Needs to Know Allan Friedman
    18. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
    19. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
    20. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
    21. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
    22. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
    23. Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Eric Cole
    24. A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Bruce Schneier
    25. Ethical Hacking Bible: Cybersecurity, Cryptography, Network Security, Wireless Technology and Wireless Hacking with Kali Linux | 7 books in 1 HUGO HOFFMAN
    26. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
    27. RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals Brown Brown
    28. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
    29. Social Engineering: The Art of Human Hacking Christopher Hadnagy
    30. CISSP All-in-One Exam Guide, Ninth Edition Fernando Maymi
    31. Ransomware Protection Playbook Roger A. Grimes
    32. The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
    33. Cybercrime Investigators Handbook Graeme Edwards
    34. Project Zero Trust: A Story about a Strategy for Aligning Security and the Business George Finney
    35. Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
    36. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition Mike Chapple
    37. We Have Root: Even More Advice from Schneier on Security Bruce Schneier
    38. Unmasking the Social Engineer: The Human Element of Security Paul Ekman
    39. Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions Daniel Lohrmann
    40. The Digital Silk Road: China's Quest to Wire the World and Win the Future Jonathan E. Hillman
    41. The DevSecOps Playbook: Deliver Continuous Security at Speed Sean D. Mack
    42. The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Perry Carpenter
    43. Algorithms Panos Louridas
    44. New Laws of Robotics: Defending Human Expertise in the Age of AI Frank Pasquale
    45. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III

    Vælg dit abonnement

    • Over 600.000 titler

    • Download og nyd titler offline

    • Eksklusive titler + Mofibo Originals

    • Børnevenligt miljø (Kids Mode)

    • Det er nemt at opsige når som helst

    Flex

    For dig som vil prøve Mofibo.

    89 kr. /måned
    • 1 konto

    • 20 timer/måned

    • Gem op til 100 ubrugte timer

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Prøv gratis
    Den mest populære

    Premium

    For dig som lytter og læser ofte.

    129 kr. /måned
    • 1 konto

    • 100 timer/måned

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Start tilbuddet

    Unlimited

    For dig som lytter og læser ubegrænset.

    149 kr. /måned
    • 1 konto

    • Ubegrænset adgang

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Start tilbuddet

    Family

    For dig som ønsker at dele historier med familien.

    Fra 179 kr. /måned
    • 2-6 konti

    • 100 timer/måned pr. konto

    • Fri lytning til podcasts

    • Kun 39 kr. pr. ekstra konto

    • Ingen binding

    2 konti

    179 kr. /måned
    Prøv gratis