Practical Threat Intelligence and Data-Driven Threat Hunting

ebook Elevate your cybersecurity efforts, enhance detection, and defend with ATT&CKTM & open tools

By Valentina Costa-Gazcón

cover image of Practical Threat Intelligence and Data-Driven Threat Hunting

Sign up to save your library

With an OverDrive account, you can save your favorite libraries for at-a-glance information about availability. Find out more about OverDrive accounts.

   Not today

Find this title in Libby, the library reading app by OverDrive.

Download Libby on the App Store Download Libby on Google Play

Search for a digital library with this title

Title found at these libraries:

Library Name Distance
Loading...
Strengthen your cybersecurity approach through hands-on threat intelligence and data-driven hunting method

Key Features
  • Set up an environment to centralize all data in an Elasticsearch, Logstash, and Kibana (ELK) server that enables threat hunting
  • Dive into the world of data-driven threat hunting by mastering the process of collecting, modeling, and analyzing data
  • Explore advanced threat hunting techniques using the MITRE ATT&CK Framework
  • Book DescriptionPractical Threat Intelligence and Data-Driven Threat Hunting, 2nd edition" is more than just a book—it's your roadmap to becoming a proficient threat hunter and a valuable asset to your organization's cybersecurity efforts. Whether you're looking to start a career in cyber intelligence or seeking to enhance your existing skills, this book equips you with the knowledge and practical insights needed to proactively detect and thwart cyber threats. With a strong focus on hands-on learning and open-source tools, it's your ultimate guide to staying ahead in the ever-changing world of cybersecurity. You'll start by unraveling the core concepts of cyber threat intelligence, diving into the intricacies of threat intelligence cycles and understanding the nuances of advanced persistent threats. From there, you'll learn how to collect and analyze indicators of compromise, set up a centralized threat hunting environment using open-source tools, and develop hypotheses for hunting campaigns. The book will also guide you through the MITRE ATT&CK Framework, providing practical examples and hands-on experience. Don't wait for threats to knock on your door. Be the hunter, not the hunted. Get your copy of "Practical Threat Intelligence and Data-Driven Threat Hunting, 2nd edition" and empower yourself to defend against cyber adversaries effectively.What you will learn
  • Gain a comprehensive understanding of cyber threat intelligence and its role in safeguarding your organization against threats
  • Explore the various stages of the threat hunting process
  • Master the art of collecting and analyzing threat data
  • Familiarize yourself with the MITRE ATT&CK Framework
  • Set up a research environment using open-source tools
  • Query and analyze data to carry out atomic tests and identify potential threats
  • Discover the power of threat actor emulation
  • Who this book is for

    If you are looking to start out in the cyber intelligence and threat hunting domains and want to know more about how to implement a threat hunting division with open-source tools, then this cyber threat intelligence book is for you.

    ]]>
    Practical Threat Intelligence and Data-Driven Threat Hunting