Chargement en cours…

Operationalizing Threat Intelligence : a Guide to Developing and Operationalizing Cyber Threat Intelligence Programs.

Learn cyber threat intelligence fundamentals to implement and operationalize an organizational intelligence program Key Features Develop and implement a threat intelligence program from scratch Discover techniques to perform cyber threat intelligence, collection, and analysis using open-source tools...

Description complète

Détails bibliographiques
Cote:Libro Electrónico
Auteur principal: Wilhoit, Kyle
Autres auteurs: Opacki, Joseph
Format: Électronique eBook
Langue:Inglés
Publié: Birmingham : Packt Publishing, Limited, 2022.
Sujets:
Accès en ligne:Texto completo (Requiere registro previo con correo institucional)
Table des matières:
  • Table of Contents Why You Need a Threat Intelligence Program Threat Actors, Campaigns, and Tooling Guidelines and Policies Threat Intelligence Frameworks, Standards, Models, and Platforms Operational Security (OPSEC) Technical Threat Intelligence – Collection Technical Threat Analysis – Enrichment Technical Threat Analysis – Threat Hunting and Pivoting Technical Threat Analysis – Similarity Analysis Preparation and Dissemination Fusion into Other Enterprise Operations Overview of Datasets and Their Practical Application Conclusion.