Operationalizing Threat Intelligence : a Guide to Developing and Operationalizing Cyber Threat Intelligence Programs.
Learn cyber threat intelligence fundamentals to implement and operationalize an organizational intelligence program Key Features Develop and implement a threat intelligence program from scratch Discover techniques to perform cyber threat intelligence, collection, and analysis using open-source tools...
Cote: | Libro Electrónico |
---|---|
Auteur principal: | |
Autres auteurs: | |
Format: | Électronique eBook |
Langue: | Inglés |
Publié: |
Birmingham :
Packt Publishing, Limited,
2022.
|
Sujets: | |
Accès en ligne: | Texto completo (Requiere registro previo con correo institucional) |
Table des matières:
- Table of Contents Why You Need a Threat Intelligence Program Threat Actors, Campaigns, and Tooling Guidelines and Policies Threat Intelligence Frameworks, Standards, Models, and Platforms Operational Security (OPSEC) Technical Threat Intelligence – Collection Technical Threat Analysis – Enrichment Technical Threat Analysis – Threat Hunting and Pivoting Technical Threat Analysis – Similarity Analysis Preparation and Dissemination Fusion into Other Enterprise Operations Overview of Datasets and Their Practical Application Conclusion.