Nouveauté

Learn Blue Teaming and Threat Management: Proactive defense, threat hunting, and incident response strategies

Par : Akash Hedaoo
Offrir maintenant
Ou planifier dans votre panier
Disponible dans votre compte client Decitre ou Furet du Nord dès validation de votre commande. Le format ePub protégé est :
  • Compatible avec une lecture sur My Vivlio (smartphone, tablette, ordinateur)
  • Compatible avec une lecture sur liseuses Vivlio
  • Pour les liseuses autres que Vivlio, vous devez utiliser le logiciel Adobe Digital Edition. Non compatible avec la lecture sur les liseuses Kindle, Remarkable et Sony
  • Non compatible avec un achat hors France métropolitaine
Logo Vivlio, qui est-ce ?

Notre partenaire de plateforme de lecture numérique où vous retrouverez l'ensemble de vos ebooks gratuitement

Pour en savoir plus sur nos ebooks, consultez notre aide en ligne ici
C'est si simple ! Lisez votre ebook avec l'app Vivlio sur votre tablette, mobile ou ordinateur :
Google PlayApp Store
  • FormatePub
  • ISBN978-93-6589-684-8
  • EAN9789365896848
  • Date de parution28/10/2025
  • Protection num.Adobe DRM
  • Infos supplémentairesepub
  • ÉditeurBPB Publications

Résumé

DESCRIPTION Cyber threats are more complicated than ever, from zero-day exploits to advanced persistent threats. To keep digital assets safe from a constantly changing attack landscape, there is a huge need for skilled cybersecurity defenders, also known as the blue team. This book is a step-by-step guide to joining the front lines of defense. You will learn how to run a modern Security Operations Center (SOC) and how to handle incidents by starting with the basics of networking, logging, and security frameworks (NIST, MITRE ATT&CK).
Some of the main things to focus on are advanced log analysis using tools like SIEM/SOAR/EDR, hypothesis-driven threat hunting to find hidden enemies, and dealing with serious threats like ransomware and APTs. By the end of this book, you will have the skills and strategic mindset you need to confidently take on a blue team role, make smart choices, and actively protect your organization's most important assets.
WHAT YOU WILL LEARN? Learn core defensive security tools like SIEM, EDR, and SOAR.   ? Execute hypothesis-driven threat hunting to find hidden threats.    ? Build and manage a modern SOC.   ? Formulate and execute a complete incident response plan.    ? Defend against advanced threats like ransomware and APTs.? Confidently transition into a professional blue team defender role.? Protect your organization's most critical digital assets strategically.
WHO THIS BOOK IS FORThis book is for aspiring or current SOC analysts, incident responders, and security analysts ready to master defensive security. It is a hands-on guide for IT professionals aiming to specialize or move their career in proactive enterprise cyber defense. 
DESCRIPTION Cyber threats are more complicated than ever, from zero-day exploits to advanced persistent threats. To keep digital assets safe from a constantly changing attack landscape, there is a huge need for skilled cybersecurity defenders, also known as the blue team. This book is a step-by-step guide to joining the front lines of defense. You will learn how to run a modern Security Operations Center (SOC) and how to handle incidents by starting with the basics of networking, logging, and security frameworks (NIST, MITRE ATT&CK).
Some of the main things to focus on are advanced log analysis using tools like SIEM/SOAR/EDR, hypothesis-driven threat hunting to find hidden enemies, and dealing with serious threats like ransomware and APTs. By the end of this book, you will have the skills and strategic mindset you need to confidently take on a blue team role, make smart choices, and actively protect your organization's most important assets.
WHAT YOU WILL LEARN? Learn core defensive security tools like SIEM, EDR, and SOAR.   ? Execute hypothesis-driven threat hunting to find hidden threats.    ? Build and manage a modern SOC.   ? Formulate and execute a complete incident response plan.    ? Defend against advanced threats like ransomware and APTs.? Confidently transition into a professional blue team defender role.? Protect your organization's most critical digital assets strategically.
WHO THIS BOOK IS FORThis book is for aspiring or current SOC analysts, incident responders, and security analysts ready to master defensive security. It is a hands-on guide for IT professionals aiming to specialize or move their career in proactive enterprise cyber defense.