Incident Response with Threat Intelligence
This book focuses on developing a capacity to manage cybersecurity incidents by practically implementing methodologies, platforms, and tools through step-by-step exercises. You'll learn how to respond to cybersecurity incidents using intelligence-based threat hunting techniques.
Offered by
Difficulty Level
Intermediate
Completion Time
15h36m
Language
English
About Book
Who Is This Book For?
If you are an information security professional or anyone who wants to learn the principles of incident management, first response, threat hunting, and threat intelligence using a variety of platforms and tools, this book is for you. Although not necessary, basic knowledge of Linux, Windows internals, and network protocols will be helpful.
Incident Response with Threat Intelligence
- About Book
- Who Is This Book For?
- Book Content
Book content
chapters • 15h36m total length
Threat Landscape and Cybersecurity Incidents
Concepts of Digital Forensics and Incident Response
Basics of the Incident Response and Triage Procedures
Applying First Response Procedures
Identifying and Profiling Threat Actors
Understanding the Cyber Kill Chain and the MITRE ATT&CK Framework
Using Cyber Threat Intelligence in Incident Response
Building an Incident Response Capability
Creating Incident Response Plans and Playbooks
Implementing an Incident Management System
Integrating SOAR Capabilities into Incident Response
Working with Analytics and Detection Engineering in Incident Response
Creating and Deploying Detection Rules
Hunting and Investigating Security Incidents
Related Resources
Access Ready-to-Use Books for Free!
Get instant access to a library of pre-built books—free trial, no credit card required. Start training your team in minutes!