Incident Response in the Age of Cloud Incident Response in the Age of Cloud

Incident Response in the Age of Cloud

Techniques and best practices to effectively respond to cybersecurity incidents

    • ‏27٫99 US$
    • ‏27٫99 US$

وصف الناشر

Learn to identify security incidents and build a series of best practices to stop cyber attacks before they create serious consequences

Key Features
Discover Incident Response (IR), from its evolution to implementationUnderstand cybersecurity essentials and IR best practices through real-world phishing incident scenariosExplore the current challenges in IR through the perspectives of leading experts
Book Description

Cybercriminals are always in search of new methods to infiltrate systems. Quickly responding to an incident will help organizations minimize losses, decrease vulnerabilities, and rebuild services and processes.

In the wake of the COVID-19 pandemic, with most organizations gravitating towards remote working and cloud computing, this book uses frameworks such as MITRE ATT&CK® and the SANS IR model to assess security risks.

The book begins by introducing you to the cybersecurity landscape and explaining why IR matters. You will understand the evolution of IR, current challenges, key metrics, and the composition of an IR team, along with an array of methods and tools used in an effective IR process. You will then learn how to apply these strategies, with discussions on incident alerting, handling, investigation, recovery, and reporting.

Further, you will cover governing IR on multiple platforms and sharing cyber threat intelligence and the procedures involved in IR in the cloud. Finally, the book concludes with an “Ask the Experts” chapter wherein industry experts have provided their perspective on diverse topics in the IR sphere.

By the end of this book, you should become proficient at building and applying IR strategies pre-emptively and confidently.

What you will learn
Understand IR and its significanceOrganize an IR teamExplore best practices for managing attack situations with your IR teamForm, organize, and operate a product security team to deal with product vulnerabilities and assess their severityOrganize all the entities involved in product security responseRespond to security vulnerabilities using tools developed by Keepnet Labs and BinalyzeAdapt all the above learnings for the cloud
Who this book is for

This book is aimed at first-time incident responders, cybersecurity enthusiasts who want to get into IR, and anyone who is responsible for maintaining business security. It will also interest CIOs, CISOs, and members of IR, SOC, and CSIRT teams. However, IR is not just about information technology or security teams, and anyone with a legal, HR, media, or other active business role would benefit from this book.

The book assumes you have some admin experience. No prior DFIR experience is required. Some infosec knowledge will be a plus but isn't mandatory.

النوع
كمبيوتر وإنترنت
تاريخ النشر
٢٠٢١
٢٦ فبراير
اللغة
EN
الإنجليزية
عدد الصفحات
٦٢٢
الناشر
Packt Publishing
البائع
Ingram DV LLC
الحجم
٤٦٫٥
‫م.ب.‬
Cybersecurity Blue Team Strategies Cybersecurity Blue Team Strategies
٢٠٢٣
Mastering Cyber Intelligence Mastering Cyber Intelligence
٢٠٢٢
Modern Security Operations Center, The Modern Security Operations Center, The
٢٠٢١
CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide, Second Edition (Exam CS0-002) CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide, Second Edition (Exam CS0-002)
٢٠٢٠
CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002) CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002)
٢٠٢١
Security Operations Center - SIEM Use Cases and Cyber Threat Intelligence Security Operations Center - SIEM Use Cases and Cyber Threat Intelligence
٢٠١٨
Cybersecurity: The Beginner's Guide Cybersecurity: The Beginner's Guide
٢٠١٩
Hands-On Cybersecurity for Finance Hands-On Cybersecurity for Finance
٢٠١٩
Learn Social Engineering Learn Social Engineering
٢٠١٨
Cybersecurity Leadership Demystified Cybersecurity Leadership Demystified
٢٠٢٢
Cybersecurity - Attack and Defense Strategies Cybersecurity - Attack and Defense Strategies
٢٠١٨