Free Download Practical Threat Intelligence and Data-Driven Threat Hunting: Elevate your cybersecurity efforts, enhance detection, and defend with ATT&CK™ & open tools by Valentina Costa- Gazcón
English | July 9, 2025 | ISBN: 1803233753 | 334 pages | EPUB | 14 Mb
Strengthen your cybersecurity approach through hands-on threat intelligence and data-driven hunting method
Key FeaturesSet up an environment to centralize all data in an Elasticsearch, Logstash, and Kibana (ELK) server that enables threat huntingDive into the world of data-driven threat hunting by mastering the process of collecting, modeling, and analyzing dataExplore advanced threat hunting techniques using the MITRE ATT&CK FrameworkBook Description
Practical Threat Intelligence and Data-Driven Threat Hunting, 2nd edition" is more than just a book-it's your roadmap to becoming a proficient threat hunter and a valuable asset to your organization's cybersecurity efforts. Whether you're looking to start a career in cyber intelligence or seeking to enhance your existing skills, this book equips you with the knowledge and practical insights needed to proactively detect and thwart cyber threats. With a strong focus on hands-on learning and open-source tools, it's your ultimate guide to staying ahead in the ever-changing world of cybersecurity. You'll start by unraveling the core concepts of cyber threat intelligence, diving into the intricacies of threat intelligence cycles and understanding the nuances of advanced persistent threats. From there, you'll learn how to collect and analyze indicators of compromise, set up a centralized threat hunting environment using open-source tools, and develop hypotheses for hunting campaigns. The book will also guide you through the MITRE ATT&CK Framework, providing practical examples and hands-on experience.
Don't wait for threats to knock on your door. Be the hunter, not the hunted. Get your copy of "Practical Threat Intelligence and Data-Driven Threat Hunting, 2nd edition" and empower yourself to defend against cyber adversaries effectively.
What you will learnGain a comprehensive understanding of cyber threat intelligence and its role in safeguarding your organization against threatsExplore the various stages of the threat hunting processMaster the art of collecting and analyzing threat dataFamiliarize yourself with the MITRE ATT&CK FrameworkSet up a research environment using open-source toolsQuery and analyze data to carry out atomic tests and identify potential threatsDiscover the power of threat actor emulationWho this book is for
If you are looking to start out in the cyber intelligence and threat hunting domains and want to know more about how to implement a threat hunting division with open-source tools, then this cyber threat intelligence book is for you.
Table of ContentsWhat is Cyber Threat Intelligence?What is Threat Hunting?Where does data come from?Mapping the AdversaryWorking with the dataEmulating the AdversaryCreating a research environmentHow to query the dataHunting for the AdversaryDocumenting and automating the processAssessing data qualityUnderstanding the OutputDefining Good Metrics to Track SuccessCommunicating results to the executivesAppendix
Code:
Bitte
Anmelden
oder
Registrieren
um Code Inhalt zu sehen!