Beschreibung
A strong cybersecurity program needs to stay informed. With this all-in-one guide, master both the theory and practice of cyber threat intelligence (CTI). Walk through the intelligence lifecycle, and then get up to speed on the latest tools and technologies for intelligence gathering, adversary profiling, network and host-based forensics, threat hunting, and more. Follow practical examples that showcase key CTI strategies in modern security operations. Highlights include: 1)Cyber intelligence lifecycle 2)Opensource intelligence (OSINT) 3)Human intelligence (HUMINT) 4)Signals intelligence (SIGINT) 5)Intelligence gathering 6)Adversary profiling 7)Threat intelligence feed integrity 8)Network forensics 9)Hostbased forensics 10)Incident response 11)Threat hunting 12)Automation
Herstellerkennzeichnung:
Rheinwerk Publishing, Inc.
2 Heritage Drive
02171 Quincy
US
E-Mail: info@rheinwerk-publishing.com




































































































