Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Practical Cyber Threat Intelligence
by
Dr. Erdal Ozkaya
in
COM015000 COMPUTERS / Security / Viruses & Malware
/ COM053000 COMPUTERS / Security / General
/ Computer software
/ Computer Technology
/ COMPUTERS / Security / Networking
/ Cyber intelligence (Computer security)
/ Cyberspace operations (Military science)
/ Cyberterrorism-Prevention
/ Nonfiction
/ Software architecture
2022
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Practical Cyber Threat Intelligence
by
Dr. Erdal Ozkaya
in
COM015000 COMPUTERS / Security / Viruses & Malware
/ COM053000 COMPUTERS / Security / General
/ Computer software
/ Computer Technology
/ COMPUTERS / Security / Networking
/ Cyber intelligence (Computer security)
/ Cyberspace operations (Military science)
/ Cyberterrorism-Prevention
/ Nonfiction
/ Software architecture
2022
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Practical Cyber Threat Intelligence
by
Dr. Erdal Ozkaya
in
COM015000 COMPUTERS / Security / Viruses & Malware
/ COM053000 COMPUTERS / Security / General
/ Computer software
/ Computer Technology
/ COMPUTERS / Security / Networking
/ Cyber intelligence (Computer security)
/ Cyberspace operations (Military science)
/ Cyberterrorism-Prevention
/ Nonfiction
/ Software architecture
2022
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
eBook
Practical Cyber Threat Intelligence
2022
Request Book From Autostore
and Choose the Collection Method
Overview
Knowing your threat actors together with your weaknesses and the technology will master your defense
Key Features
? Gain practical experience with cyber threat intelligence by using the book's lab sections.
? Improve your CTI skills by designing a threat intelligence system.
? Assisting you in bridging the gap between cybersecurity teams.
? Developing your knowledge of Cyber Intelligence tools and how to choose them.
Description
When your business assets are threatened or exposed to cyber risk, you want a high-quality threat hunting team armed with cutting-edge threat intelligence to build the shield. Unfortunately, regardless of how effective your cyber defense solutions are, if you are unfamiliar with the tools, strategies, and procedures used by threat actors, you will be unable to stop them.This book is intended to provide you with the practical exposure necessary to improve your cyber threat intelligence and hands-on experience with numerous CTI technologies. This book will teach you how to model threats by gathering adversarial data from various sources, pivoting on the adversarial data you have collected, developing the knowledge necessary to analyse them and discriminating between bad and good information.The book develops and hones the analytical abilities necessary for extracting, comprehending, and analyzing threats comprehensively. The readers will understand the most common indicators of vulnerability that security professionals can use to determine hacking attacks or threats in their systems quickly. In addition, the reader will investigate and illustrate ways to forecast the scope of attacks and assess the potential harm they can cause.
What you will learn
? Hands-on experience in developing a powerful and robust threat intelligence model.
? Acquire the ability to gather, exploit, and leverage adversary data.
? Recognize the difference between bad intelligence and good intelligence.
? Creating heatmaps and various visualization reports for better insights.
? Investigate the most typical indicators of security compromise.
? Strengthen your analytical skills to understand complicated threat scenarios better.
Who this book is for
The book is designed for aspiring Cyber Threat Analysts, Security Analysts, Cybersecurity specialists, Security Consultants, and Network Security Professionals who wish to acquire and hone their analytical abilities to identify and counter threats quickly.
Table of Contents
1. Basics of Threat Analysis and Modeling
2. Formulate a Threat Intelligence Model
3. Adversary Data Collection Sources & Methods
4. Pivot Off and Extracting Adversarial Data
5. Primary Indicators of Security Compromise
6. Identify & Build Indicators of Compromise
7. Conduct Threat Assessments In Depth
8. Produce Heat Maps, Infographics & Dashboards
9. Build Reliable & Robust Threat Intelligence System
10. Learn Statistical Approaches for Threat Intelligence
11. Develop Analytical Skills for Complex Threats
12. Planning for Disaster
Publisher
BPB Publications,De Gruyter
Subject
ISBN
9789355510297, 9355510292
MBRLCatalogueRelatedBooks
Related Items
Related Items
This website uses cookies to ensure you get the best experience on our website.