Mastering Cyber Intelligence: Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense
暫譯: 掌握網路情報:獲得全面的知識和技能以進行威脅情報,提升系統防禦效能

Dahj, Jean Nestor M.

  • 出版商: Packt Publishing
  • 出版日期: 2022-04-29
  • 售價: $1,800
  • 貴賓價: 9.5$1,710
  • 語言: 英文
  • 頁數: 528
  • 裝訂: Quality Paper - also called trade paper
  • ISBN: 1800209401
  • ISBN-13: 9781800209404
  • 相關分類: Wireless-networks資訊安全
  • 立即出貨 (庫存=1)

相關主題

商品描述

Develop the analytical skills to effectively safeguard your organization by enhancing defense mechanisms, and become a proficient threat intelligence analyst to help strategic teams in making informed decisions

Key Features

- Build the analytics skills and practices you need for analyzing, detecting, and preventing cyber threats
- Learn how to perform intrusion analysis using the cyber threat intelligence (CTI) process
- Integrate threat intelligence into your current security infrastructure for enhanced protection

Book Description

The sophistication of cyber threats, such as ransomware, advanced phishing campaigns, zero-day vulnerability attacks, and advanced persistent threats (APTs), is pushing organizations and individuals to change strategies for reliable system protection. Cyber Threat Intelligence converts threat information into evidence-based intelligence that uncovers adversaries' intents, motives, and capabilities for effective defense against all kinds of threats.

This book thoroughly covers the concepts and practices required to develop and drive threat intelligence programs, detailing the tasks involved in each step of the CTI lifecycle. You'll be able to plan a threat intelligence program by understanding and collecting the requirements, setting up the team, and exploring the intelligence frameworks. You'll also learn how and from where to collect intelligence data for your program, considering your organization level. With the help of practical examples, this book will help you get to grips with threat data processing and analysis. And finally, you'll be well-versed with writing tactical, technical, and strategic intelligence reports and sharing them with the community.

By the end of this book, you'll have acquired the knowledge and skills required to drive threat intelligence operations from planning to dissemination phases, protect your organization, and help in critical defense decisions.

What you will learn

- Understand the CTI lifecycle which makes the foundation of the study
- Form a CTI team and position it in the security stack
- Explore CTI frameworks, platforms, and their use in the program
- Integrate CTI in small, medium, and large enterprises
- Discover intelligence data sources and feeds
- Perform threat modelling and adversary and threat analysis
- Find out what Indicators of Compromise (IoCs) are and apply the pyramid of pain in threat detection
- Get to grips with writing intelligence reports and sharing intelligence

Who this book is for

This book is for security professionals, researchers, and individuals who want to gain profound knowledge of cyber threat intelligence and discover techniques to prevent varying types of cyber threats. Basic knowledge of cybersecurity and network fundamentals is required to get the most out of this book.

商品描述(中文翻譯)

開發分析技能,以有效保護您的組織,增強防禦機制,並成為熟練的威脅情報分析師,幫助戰略團隊做出明智的決策。

主要特點

- 建立分析技能和實踐,以分析、檢測和防止網路威脅
- 學習如何使用網路威脅情報 (CTI) 流程進行入侵分析
- 將威脅情報整合到您當前的安全基礎設施中,以增強保護

書籍描述

網路威脅的複雜性,例如勒索病毒、高級釣魚攻擊、零日漏洞攻擊和持續性威脅 (APTs),迫使組織和個人改變可靠系統保護的策略。網路威脅情報將威脅信息轉換為基於證據的情報,揭示對手的意圖、動機和能力,以有效防禦各種威脅。

本書全面涵蓋了開發和推動威脅情報計劃所需的概念和實踐,詳細說明了 CTI 生命週期每個步驟中涉及的任務。您將能夠通過理解和收集需求、組建團隊以及探索情報框架來規劃威脅情報計劃。您還將學習如何以及從何處收集您的計劃所需的情報數據,考慮到您的組織層級。在實用範例的幫助下,本書將幫助您掌握威脅數據處理和分析。最後,您將熟悉撰寫戰術、技術和戰略情報報告,並與社群分享。

在本書結束時,您將獲得從規劃到傳播階段推動威脅情報操作所需的知識和技能,保護您的組織,並協助做出關鍵防禦決策。

您將學到的內容

- 理解 CTI 生命週期,這是學習的基礎
- 組建 CTI 團隊並將其定位於安全堆疊中
- 探索 CTI 框架、平台及其在計劃中的使用
- 在小型、中型和大型企業中整合 CTI
- 發現情報數據來源和供應
- 執行威脅建模以及對手和威脅分析
- 了解什麼是妥協指標 (IoCs),並在威脅檢測中應用痛苦金字塔
- 掌握撰寫情報報告和分享情報的技巧

本書適合對象

本書適合安全專業人士、研究人員以及希望深入了解網路威脅情報並發現防止各種網路威脅技術的個人。為了充分利用本書,需具備基本的網路安全和網路基礎知識。

作者簡介

Jean Nestor Dahj M. is a data scientist, cybersecurity researcher & analyst, and telecom professional with wide technical and scientific abilities. His skills have led him to data science, network probing, penetration testing & hacking, threat intelligence, and network analytics. He has built a wide range of skillsets through training and consultancy, including skills in cryptography, computer forensics, malware coding, and data products. Jean Nestor holds a master’s degree (M-Tech) in Electrical Engineering from the University of South Africa. He is currently pursuing a PhD in the same field at the University of Johannesburg. His work history includes the likes of Huawei, Commprove technologies, Siftcon Forensic Services, Metro Teleworks, and Nanofritech Consulting. He is currently a full-stack data scientist at Rain Networks, part of a dynamic team developing data solutions. He currently lives in Pretoria and is originally from Kikwit, a small city in DR Congo

作者簡介(中文翻譯)

Jean Nestor Dahj M. 是一位資料科學家、網路安全研究員與分析師,以及擁有廣泛技術和科學能力的電信專業人士。他的技能使他進入了資料科學、網路探測、滲透測試與駭客技術、威脅情報和網路分析等領域。他通過培訓和顧問工作建立了廣泛的技能組合,包括密碼學、電腦取證、惡意程式碼編寫和資料產品等技能。Jean Nestor 擁有南非大學的電機工程碩士學位(M-Tech)。他目前正在約翰尼斯堡大學攻讀同一領域的博士學位。他的工作經歷包括華為、Commprove Technologies、Siftcon Forensic Services、Metro Teleworks 和 Nanofritech Consulting 等公司。他目前是 Rain Networks 的全端資料科學家,隸屬於一個開發資料解決方案的動態團隊。他目前居住在比勒陀利亞,原籍於剛果民主共和國的小城市基基維特。

目錄大綱

1. Cyber Threat Intelligence Life Cycle
2. Requirements and Intelligent Team Implementation
3. Cyber Threat Intelligence Frameworks
4. Cyber Threat Intelligence Tradecraft and Standards
5. Goals Setting, procedures for CTI Strategy, and Practical Use Cases
6. Cyber Threat Modeling and Adversary Analysis
7. Threat Intelligence Data Sources
8. Effective Defensive Tactics and Data Protection
9. AI Application in Cyber Threat Analytics
10. Threat Modeling and Analysis: - Practical Use Cases
11. Usable Security: Threat Intelligence as part of the process
12. SIEM Solutions and Intelligence-driven SOCs
13. Threat Intelligence Metrics, Indicators of Compromise, and the Pyramid of Pain
14. Threat Intelligence Reporting and Dissemination
(N.B. Please use the Look Inside option to see further chapters)

目錄大綱(中文翻譯)

1. Cyber Threat Intelligence Life Cycle

2. Requirements and Intelligent Team Implementation

3. Cyber Threat Intelligence Frameworks

4. Cyber Threat Intelligence Tradecraft and Standards

5. Goals Setting, procedures for CTI Strategy, and Practical Use Cases

6. Cyber Threat Modeling and Adversary Analysis

7. Threat Intelligence Data Sources

8. Effective Defensive Tactics and Data Protection

9. AI Application in Cyber Threat Analytics

10. Threat Modeling and Analysis: - Practical Use Cases

11. Usable Security: Threat Intelligence as part of the process

12. SIEM Solutions and Intelligence-driven SOCs

13. Threat Intelligence Metrics, Indicators of Compromise, and the Pyramid of Pain

14. Threat Intelligence Reporting and Dissemination

(N.B. Please use the Look Inside option to see further chapters)