Tabla de Contenidos:
  • Cover
  • About the Author
  • Title Page
  • Copyright Page
  • Dedication
  • Contents at a Glance
  • Contents
  • Acknowledgments
  • Introduction
  • Part I Threat and Vulnerability Management
  • Chapter 1 The Importance of Threat Data and Intelligence
  • Chapter 2 Threat Intelligence in Support of Organizational Security
  • Chapter 3 Vulnerability Management Activities
  • Chapter 4 Vulnerability Assessment Tools
  • Chapter 5 Threats and Vulnerabilities Associated with Specialized Technology
  • Chapter 6 Threats and Vulnerabilities Associated with Operating in the Cloud
  • Chapter 7 Mitigating Controls for Attacks and Software Vulnerabilities
  • Part II Software and Systems Security
  • Chapter 8 Security Solutions for Infrastructure Management
  • Chapter 9 Software Assurance Best Practices
  • Chapter 10 Hardware Assurance Best Practices
  • Part III Security Operations and Monitoring
  • Chapter 11 Data Analysis in Security Monitoring Activities
  • Chapter 12 Implement Configuration Changes to Existing Controls to Improve Security
  • Chapter 13 The Importance of Proactive Threat Hunting
  • Chapter 14 Automation Concepts and Technologies
  • Part IV Incident Response
  • Chapter 15 The Importance of the Incident Response Process
  • Chapter 16 Appropriate Incident Response Procedures
  • Chapter 17 Analyze Potential Indicators of Compromise
  • Chapter 18 Utilize Basic Digital Forensics Techniques
  • Part V Compliance and Assessment
  • Chapter 19 The Importance of Data Privacy and Protection
  • Chapter 20 Security Concepts in Support of Organizational Risk Mitigation
  • Chapter 21 The Importance of Frameworks, Policies, Procedures, and Controls
  • Part VI Appendixes
  • Appendix A Objective Map
  • Appendix B About the Online Content.