0
نام کتاب
Open-Source Security Operations Center (SOC)

A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC

Alfred Basta, Nadine Basta, Waqar Anwar, Mohammad Ilyas Essar

Paperback468 Pages
PublisherWiley
Edition1
LanguageEnglish
Year2024
ISBN9781394201600
634
A5563
انتخاب نوع چاپ:
جلد سخت
812,000ت
0
جلد نرم
732,000ت
0
طلق پاپکو و فنر
742,000ت
0
مجموع:
0تومان
کیفیت متن:اورجینال انتشارات
قطع:B5
رنگ صفحات:سیاه و سفید
پشتیبانی در روزهای تعطیل!
ارسال به سراسر کشور

#SOC

#Open-Source

#Security

#cybersecurity

#Hunting

#Machine_Learning

#Network

توضیحات

A comprehensive and up-to-date exploration of implementing and managing a security operations center in an open-source environment


In Open-Source Security Operations Center (SOC): A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC, a team of veteran cybersecurity practitioners delivers a practical and hands-on discussion of how to set up and operate a security operations center (SOC) in a way that integrates and optimizes existing security procedures. You’ll explore how to implement and manage every relevant aspect of cybersecurity, from foundational infrastructure to consumer access points.


In the book, the authors explain why industry standards have become necessary and how they have evolved – and will evolve – to support the growing cybersecurity demands in this space. Readers will also find:

  • A modular design that facilitates use in a variety of classrooms and instructional settings
  • Detailed discussions of SOC tools used for threat prevention and detection, including vulnerability assessment, behavioral monitoring, and asset discovery
  • Hands-on exercises, case studies, and end-of-chapter questions to enable learning and retention


Perfect for cybersecurity practitioners and software engineers working in the industry, Open-Source Security Operations Center (SOC) will also prove invaluable to managers, executives, and directors who seek a better technical understanding of how to secure their networks and products.


Table of Contents

1 Introduction to SOC Analysis

2 SOC Pillars

3 Security Incident Response

4 Log and Event Analysis

5 Network Traffic Analysis

6 Endpoint Analysis and Threat Hunting

7 Security Information and Event Management (SIEM)

8 Security Analytics and Machine Learning in SOC

9 Incident Response Automation and Orchestration

10 SOC Metrics and Performance Measurement

11 Compliance and Regulatory Considerations in SOC

12 Cloud Security and SOC Operations

13 Threat Intelligence and Advanced Threat Hunting

14 Emerging Trends and the Future of SOC Analysis

15 Cybersecurity Awareness and Training in SOC Operations


About the Author

Alfred Basta, PhD, CCP (CMMC), CISM, CPENT, LPT, OSCP, PMP, CRTO, CHPSE, CRISC, CISA, CGEIT, CASP+, CYSA+, is a professor of mathematics, cryptography, and information security as well as a professional speaker on internet security, networking, and cryptography. He is a member of many associations, including ISACA, ECE, and the Mathematical Association of America. Dr. Basta’s other publications include Pen Testing from Contract to Report, Computer Security and Penetration Testing, Mathematics for Information Technology, Linux Operations and Administration, and Database Security. In addition, Dr. Basta is the chair of EC-Council’s CPENT Scheme Committee. He has worked as a faculty member and curriculum advisor for programming and cyber security programs at numerous colleges and universities.


Nadine Basta, MSc., CEH, is a professor of computer science, cybersecurity, mathematics, and information technology. Her numerous certifications include CEH, MCSE, MSDBA, CCDP, NCSE, NCTE, and CCA. A security consultant and auditor, she combines strong “in the field” experience with her academic background. She is also the author of Computer Security and Penetration Testing, Mathematics for Information Technology, and Linux Operations and Administration. Nadine has extensive teaching and research experience in computer science and cybersecurity.


Waqar Anwar is a Cybersecurity Curriculum Specialist with over 10 years of experience in the field. He also develops and delivers training to faculty and staff on cybersecurity topics and conducts research on cybersecurity topics. Mr. Anwar is a frequent speaker at industry conferences. He is also a member of several cybersecurity organizations including SysAdmin, Audit, Network and Security SANS, CYBRARY, and Information Systems Security Association International ISSA.


Mohammad Ilyas Essar is a Certified OSCP, CRTO, HTB CPTS, CASP+, PENTEST+, and CEH Master. He is currently employed as a Senior Cybersecurity Analyst in Canada. He is highly passionate and dedicated to the field of cybersecurity. With a solid career background in this domain, he brings five years of progressive experience spanning various domains. Ilyas specializes in Red Teaming, offensive security, and penetration testing, consistently achieving exceptional results. Ilyas is constantly driven to excel in his field, actively participating in Capture The Flag (CTF) competitions, where he dedicates a significant portion of his time to honing his skills as a Pentester and Red Teamer. He is also part of Synack Red Team, where he performs bug bounty hunting.

دیدگاه خود را بنویسید
نظرات کاربران (0 دیدگاه)
نظری وجود ندارد.
کتاب های مشابه
لینوکس
1,486
Learning eBPF
456,000 تومان
هک و امنیت
7,647
Web Application Security
703,000 تومان
هک و امنیت
1,249
Python for Cybersecurity
462,000 تومان
هک و امنیت
873
The Hack Is Back
625,000 تومان
هک و امنیت
1,021
The Art of Computer Virus Research and Defense
1,234,000 تومان
هک و امنیت
1,044
Threat Modeling
1,092,000 تومان
هک و امنیت
1,072
Antivirus Bypass Techniques
461,000 تومان
هک و امنیت
1,162
Malware Analysis Techniques
565,000 تومان
هک و امنیت
312
Wireshark for Security Professionals
689,000 تومان
هک و امنیت
1,230
A Hacker's Mind
578,000 تومان
قیمت
منصفانه
ارسال به
سراسر کشور
تضمین
کیفیت
پشتیبانی در
روزهای تعطیل
خرید امن
و آسان
آرشیو بزرگ
کتاب‌های تخصصی
هـر روز با بهتــرین و جــدیــدتـرین
کتاب های روز دنیا با ما همراه باشید
آدرس
پشتیبانی
مدیریت
ساعات پاسخگویی
درباره اسکای بوک
دسترسی های سریع
  • راهنمای خرید
  • راهنمای ارسال
  • سوالات متداول
  • قوانین و مقررات
  • وبلاگ
  • درباره ما
چاپ دیجیتال اسکای بوک. 2024-2022 ©