Image de Google Jackets
Vue normale Vue MARC vue ISBD

Establishing Security Operations Center Cyber incident detection analysis and threat hunting for robust security operations (English Edition) ['Vasant Kulkarni, Sameer']

Par : Contributeur(s) : Type de matériel : TexteTexteÉditeur : BPB Publications 2025Description : pType de contenu :
Type de média :
Type de support :
ISBN :
  • 9789365896060
Sujet(s) :
Ressources en ligne : Abrégé : DescriptionCyber threats are everywhere and constantly evolving. Data breaches, ransomware, and phishing have become everyday news. This book offers concepts and practical insights for setting up and managing a security operations center. You will understand why SOCs are essential in the current cyber landscape, how to build one from scratch, and how it helps organizations stay protected 24/7.This book systematically covers the entire lifecycle of a SOC, beginning with cybersecurity fundamentals, the threat landscape, and the profound implications of cyber incidents. It will guide you through why SOCs are critical in today’s cyber landscape, how to build one from the ground up, tools, roles, and real-life examples from the industry. The handling of security incidents before they turn into threats can be effective through this book. The entire ecosystem of management of security operations is covered to effectively handle and mitigate them.Upon completing this guide, you will possess a holistic understanding of SOC operations, equipped with the knowledge to strategically plan, implement, and continuously enhance your organization's cybersecurity posture, confidently navigating the complexities of modern digital defense. The book aims to empower the readers to take on the complexities of cybersecurity handling.What you will learn? Understand SOC evolution, core domains like asset/compliance management, and modern frameworks.? Implement log management, SIEM use cases, and incident response lifecycles.? Leverage threat intelligence lifecycles and proactive threat hunting methodologies.? Adapt SOCs to AI/ML, cloud, and other emerging technologies for future resilience.? Integrate SOC operations with business continuity, compliance, and industry frameworks.Who this book is forThe book serves as a guide for those who are interested in managing the facets of SOC. The responders at level 1, analysts at level 2, and senior analysts at level 3 can gain insights to refresh their understanding and provide guidance for career professionals. This book aims to equip professionals, from analysts to executives, with the knowledge to build scalable, resilient SOCs that are ready to confront emerging challenges.Table of ContentsSection 1: Understanding Security Operations Center1. Cybersecurity Basics2. Cybersecurity Ramifications and Implications3. Evolution of Security Operations Centers4. Domains of Security Operations Centers5. Modern Developments in Security Operations Centers6. Incident ResponseSection 2: SOC Components7. Analysis8. Threat Intelligence and Hunting9. PeopleSection 3: Implementing SOC10. Process11. Technology12. Building Security Operations Centers Infrastructure13. Business ContinuitySection 4: Practical Implementation Aspects14. Frameworks15. Best PracticesSection 5: Changing Dynamics of SOC with Evolving Threats Fueled by Emerging Technologies16. Impact of Emerging Technologies17. Cyber Resilient Systems18. Future Directions
Tags de cette bibliothèque : Pas de tags pour ce titre. Connectez-vous pour ajouter des tags.
Evaluations
    Classement moyen : 0.0 (0 votes)
Nous n'avons pas d'exemplaire de ce document

DescriptionCyber threats are everywhere and constantly evolving. Data breaches, ransomware, and phishing have become everyday news. This book offers concepts and practical insights for setting up and managing a security operations center. You will understand why SOCs are essential in the current cyber landscape, how to build one from scratch, and how it helps organizations stay protected 24/7.This book systematically covers the entire lifecycle of a SOC, beginning with cybersecurity fundamentals, the threat landscape, and the profound implications of cyber incidents. It will guide you through why SOCs are critical in today’s cyber landscape, how to build one from the ground up, tools, roles, and real-life examples from the industry. The handling of security incidents before they turn into threats can be effective through this book. The entire ecosystem of management of security operations is covered to effectively handle and mitigate them.Upon completing this guide, you will possess a holistic understanding of SOC operations, equipped with the knowledge to strategically plan, implement, and continuously enhance your organization's cybersecurity posture, confidently navigating the complexities of modern digital defense. The book aims to empower the readers to take on the complexities of cybersecurity handling.What you will learn? Understand SOC evolution, core domains like asset/compliance management, and modern frameworks.? Implement log management, SIEM use cases, and incident response lifecycles.? Leverage threat intelligence lifecycles and proactive threat hunting methodologies.? Adapt SOCs to AI/ML, cloud, and other emerging technologies for future resilience.? Integrate SOC operations with business continuity, compliance, and industry frameworks.Who this book is forThe book serves as a guide for those who are interested in managing the facets of SOC. The responders at level 1, analysts at level 2, and senior analysts at level 3 can gain insights to refresh their understanding and provide guidance for career professionals. This book aims to equip professionals, from analysts to executives, with the knowledge to build scalable, resilient SOCs that are ready to confront emerging challenges.Table of ContentsSection 1: Understanding Security Operations Center1. Cybersecurity Basics2. Cybersecurity Ramifications and Implications3. Evolution of Security Operations Centers4. Domains of Security Operations Centers5. Modern Developments in Security Operations Centers6. Incident ResponseSection 2: SOC Components7. Analysis8. Threat Intelligence and Hunting9. PeopleSection 3: Implementing SOC10. Process11. Technology12. Building Security Operations Centers Infrastructure13. Business ContinuitySection 4: Practical Implementation Aspects14. Frameworks15. Best PracticesSection 5: Changing Dynamics of SOC with Evolving Threats Fueled by Emerging Technologies16. Impact of Emerging Technologies17. Cyber Resilient Systems18. Future Directions

PLUDOC

PLUDOC est la plateforme unique et centralisée de gestion des bibliothèques physiques et numériques de Guinée administré par le CEDUST. Elle est la plus grande base de données de ressources documentaires pour les Étudiants, Enseignants chercheurs et Chercheurs de Guinée.

Adresse

627 919 101/664 919 101

25 boulevard du commerce
Kaloum, Conakry, Guinée

Réseaux sociaux

Powered by Netsen Group @ 2025