Agile Security Operations: Engineering for agility in cyber defense, detection, and response

دانلود کتاب Agile Security Operations: Engineering for agility in cyber defense, detection, and response

58000 تومان موجود

کتاب عملیات امنیتی چابک: مهندسی چابکی در دفاع سایبری، شناسایی و پاسخ نسخه زبان اصلی

دانلود کتاب عملیات امنیتی چابک: مهندسی چابکی در دفاع سایبری، شناسایی و پاسخ بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 8


توضیحاتی در مورد کتاب Agile Security Operations: Engineering for agility in cyber defense, detection, and response

نام کتاب : Agile Security Operations: Engineering for agility in cyber defense, detection, and response
عنوان ترجمه شده به فارسی : عملیات امنیتی چابک: مهندسی چابکی در دفاع سایبری، شناسایی و پاسخ
سری :
نویسندگان :
ناشر : Packt Publishing
سال نشر : 2022
تعداد صفحات : 0
ISBN (شابک) : 1801815518 , 9781801815512
زبان کتاب : English
فرمت کتاب : epub    درصورت درخواست کاربر به PDF تبدیل می شود
حجم کتاب : 5 مگابایت



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.

توضیحاتی در مورد کتاب :




از طریق واکنش به حادثه، ATT، با عملیات امنیتی مقابله کنید



توضیحاتی در مورد کتاب به زبان اصلی :


Get to grips with security operations through incident response, the ATT&CK framework, active defense, and agile threat intelligence

Key Features

  • Explore robust and predictable security operations based on measurable service performance
  • Learn how to improve the security posture and work on security audits
  • Discover ways to integrate agile security operations into development and operations

Book Description

Agile security operations allow organizations to survive cybersecurity incidents, deliver key insights into the security posture of an organization, and operate security as an integral part of development and operations. It is, deep down, how security has always operated at its best.

Agile Security Operations will teach you how to implement and operate an agile security operations model in your organization. The book focuses on the culture, staffing, technology, strategy, and tactical aspects of security operations. You'll learn how to establish and build a team and transform your existing team into one that can execute agile security operations. As you progress through the chapters, you'll be able to improve your understanding of some of the key concepts of security, align operations with the rest of the business, streamline your operations, learn how to report to senior levels in the organization, and acquire funding.

By the end of this Agile book, you'll be ready to start implementing agile security operations, using the book as a handy reference.

What you will learn

  • Get acquainted with the changing landscape of security operations
  • Understand how to sense an attacker's motives and capabilities
  • Grasp key concepts of the kill chain, the ATT&CK framework, and the Cynefin framework
  • Get to grips with designing and developing a defensible security architecture
  • Explore detection and response engineering
  • Overcome challenges in measuring the security posture
  • Derive and communicate business values through security operations
  • Discover ways to implement security as part of development and business operations

Who this book is for

This book is for new and established CSOC managers as well as CISO, CDO, and CIO-level decision-makers. If you work as a cybersecurity engineer or analyst, you'll find this book useful. Intermediate-level knowledge of incident response, cybersecurity, and threat intelligence is necessary to get started with the book.

Table of Contents

  1. How Security Operations Are Changing
  2. Incident Response - A Key Capability in Security Operations
  3. Engineering for Incident Response
  4. Key Concepts in Cyber Defense
  5. Defensible Architecture
  6. Active Defense
  7. How Secure are You? - Measuring Security Posture
  8. Red, Blue and Purple Teaming
  9. Running and Operating Security Services
  10. Implementing Agile Threat Intelligence



پست ها تصادفی