The Foundations of Threat Hunting: Organize and design effective cyber threat hunts to meet business needs
The Foundations of Threat Hunting: Organize and design effective cyber threat hunts to meet business needs
YOU SAVE £7.40
- Condition: Brand new
- UK Delivery times: Usually arrives within 2 - 3 working days
- UK Shipping: Fee starts at £2.39. Subject to product weight & dimension
- More about The Foundations of Threat Hunting: Organize and design effective cyber threat hunts to meet business needs
The book provides a framework for building and maturing a threat hunting team capable of stalking and trapping advanced adversaries in the darkest parts of an enterprise. It covers foundational concepts, processes, requirements, and customization of a defensive cyber framework. The book takes readers through the process of threat hunting, from understanding cybersecurity basics to the in-depth requirements of building a mature hunting capability. It includes written instructions and multiple story-driven scenarios to show the correct way to conduct a threat hunt. The book is for anyone interested in learning how to organize and execute effective cyber threat hunts, establishing extra defense capabilities within their company, and maturing an organization's cybersecurity posture.
Format: Paperback / softback
Length: 246 pages
Publication date: 17 June 2022
Publisher: Packt Publishing Limited
Threat hunting is a revolutionary approach to cyber defense that goes beyond traditional threat detection and focuses on pursuing advanced adversaries who employ novel tactics. This book provides a comprehensive guide to building and maturing a threat hunting team capable of effectively stalking and trapping these cyber threats in the darkest corners of an enterprise.
Key Features:
1. Learn foundational concepts for effective threat hunting teams: This book covers the essential principles and requirements for threat hunting, including understanding the threat landscape, identifying attack patterns, and developing effective hunting strategies.
2. Recognize processes and requirements for executing and conducting a hunt: Threat hunting is a complex process that requires careful planning, execution, and recovery. This book provides step-by-step instructions on how to plan and execute a hunt, including identifying the target, gathering evidence, and analyzing the results.
3. Customize a defensive cyber framework needed to grow and mature a hunt team: Every organization has unique cybersecurity needs, and a threat hunting framework must be customized to fit those needs. This book provides guidance on how to customize a defensive cyber framework to meet the specific requirements of your organization.
4. Book Description: Threat hunting is a concept that takes traditional cyber defense and spins it onto its head. It moves the bar for network defenses beyond looking at the known threats and allows a team to pursue adversaries that are attacking in novel ways that have not previously been seen. To successfully track down and remove these advanced attackers, a solid understanding of the foundational concepts and requirements of the threat hunting framework is needed. Moreover, to confidently employ threat hunting in a business landscape, the same team will need to be able to customize that framework to fit a customer's particular use case.
This book breaks down the fundamental pieces of a threat hunting team, the stages of a hunt, and the process that needs to be followed through planning, execution, and recovery. It will take you through the process of threat hunting, starting from understanding cybersecurity basics through to the in-depth requirements of building a mature hunting capability. This is provided through written instructions as well as multiple story-driven scenarios that show the correct (and incorrect) way to effectively conduct a threat hunt.
By the end of this cyber threat hunting book, you'll be able to identify the processes of handicapping an immature cyber threat hunt team and systematically progress the hunting capabilities to maturity.
What you'll learn:
1. Understand the threat landscape: Threat hunting requires a deep understanding of the threat landscape, including the types of threats that are prevalent, the techniques they use, and the vulnerabilities they exploit.
2. Identify attack patterns: Attack patterns are the specific ways that adversaries attack systems. Threat hunting involves identifying these patterns and developing strategies to detect and prevent them.
3. Develop effective hunting strategies: Effective hunting strategies involve a combination of technical and non-technical techniques. This book provides guidance on how to develop and implement these strategies.
4. Execute and conduct a hunt: Threat hunting is a complex process that requires careful planning, execution, and recovery. This book provides step-by-step instructions on how to plan and execute a hunt, including identifying the target, gathering evidence, and analyzing the results.
5. Customize a defensive cyber framework: Every organization has unique cybersecurity needs, and a threat hunting framework must be customized to fit those needs. This book provides guidance on how to customize a defensive cyber framework to meet the specific requirements of your organization.
6. Understand the requirements for building and maturing a threat hunting team: Building and maturing a threat hunting team requires a combination of technical skills, analytical skills, and teamwork. This book provides guidance on how to build and mature a threat hunting team.
7. Understand the stages of a hunt: Threat hunting involves a series of stages, including preparation, execution, and recovery. This book provides guidance on how to navigate these stages and achieve success.
8. Understand the process of planning, execution, and recovery: Threat hunting is a complex process that requires careful planning, execution, and recovery. This book provides step-by-step instructions on how to plan and execute a hunt, including identifying the target, gathering evidence, and analyzing the results.
9. Understand the importance of threat hunting in a business landscape: Threat hunting is a critical component of a comprehensive cybersecurity strategy. This book provides guidance on how to integrate threat hunting into your business landscape.
10. Understand the challenges of threat hunting: Threat hunting is a challenging process that requires a high level of expertise and dedication. This book provides guidance on how to overcome these challenges and achieve success.
Conclusion:
Threat hunting is a revolutionary approach to cyber defense that goes beyond traditional threat detection and focuses on pursuing advanced adversaries who employ novel tactics. This book provides a comprehensive guide to building and maturing a threat hunting team capable of effectively stalking and trapping these cyber threats in the darkest corners of an enterprise. By following the steps outlined in this book, you can improve your organization's cybersecurity posture and reduce the risk of a cyber attack.
Dimension: 93 x 75 (mm)
ISBN-13: 9781803242996
This item can be found in:
UK and International shipping information
UK and International shipping information
UK Delivery and returns information:
- Delivery within 2 - 3 days when ordering in the UK.
- Shipping fee for UK customers from £2.39. Fully tracked shipping service available.
- Returns policy: Return within 30 days of receipt for full refund.
International deliveries:
Shulph Ink now ships to Australia, Belgium, Canada, France, Germany, Ireland, Italy, India, Luxembourg Saudi Arabia, Singapore, Spain, Netherlands, New Zealand, United Arab Emirates, United States of America.
- Delivery times: within 5 - 10 days for international orders.
- Shipping fee: charges vary for overseas orders. Only tracked services are available for most international orders. Some countries have untracked shipping options.
- Customs charges: If ordering to addresses outside the United Kingdom, you may or may not incur additional customs and duties fees during local delivery.