The Foundations of Threat Hunting Organize and Design Effective Cyber Threat Hunts to Meet Business Needs

Build and mature a threat hunting team capable of repeatably stalking and trapping advanced adversaries in the darkest parts of an enterprise Key Features Learn foundational concepts for effective threat hunting teams in pursuit of cyber adversaries Recognize processes and requirements for executing...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Maurice, Chad (VerfasserIn)
Weitere Verfasser: Thompson, Jeremy (MitwirkendeR), Copeland, William (MitwirkendeR), Particini, Anthony (MitwirkendeR)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Birmingham Packt Publishing, Limited 2022
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-081559577
003 DE-627-1
005 20240228121706.0
007 cr uuu---uuuuu
008 220815s2022 xx |||||o 00| ||eng c
020 |a 9781803237282  |c electronic book  |9 978-1-80323-728-2 
020 |a 1803237287  |c electronic book  |9 1-80323-728-7 
020 |a 9781803242996  |9 978-1-80324-299-6 
035 |a (DE-627-1)081559577 
035 |a (DE-599)KEP081559577 
035 |a (ORHE)9781803242996 
035 |a (DE-627-1)081559577 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 005.87  |2 23 
100 1 |a Maurice, Chad  |e VerfasserIn  |4 aut 
245 1 4 |a The Foundations of Threat Hunting  |b Organize and Design Effective Cyber Threat Hunts to Meet Business Needs 
264 1 |a Birmingham  |b Packt Publishing, Limited  |c 2022 
300 |a 1 online resource (246 pages) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a Build and mature a threat hunting team capable of repeatably stalking and trapping advanced adversaries in the darkest parts of an enterprise Key Features Learn foundational concepts for effective threat hunting teams in pursuit of cyber adversaries Recognize processes and requirements for executing and conducting a hunt Customize a defensive cyber framework needed to grow and mature a hunt team Book Description Threat hunting is a concept that takes traditional cyber defense and spins it onto its head. It moves the bar for network defenses beyond looking at the known threats and allows a team to pursue adversaries that are attacking in novel ways that have not previously been seen. To successfully track down and remove these advanced attackers, a solid understanding of the foundational concepts and requirements of the threat hunting framework is needed. Moreover, to confidently employ threat hunting in a business landscape, the same team will need to be able to customize that framework to fit a customer's particular use case. This book breaks down the fundamental pieces of a threat hunting team, the stages of a hunt, and the process that needs to be followed through planning, execution, and recovery. It will take you through the process of threat hunting, starting from understanding cybersecurity basics through to the in-depth requirements of building a mature hunting capability. This is provided through written instructions as well as multiple story-driven scenarios that show the correct (and incorrect) way to effectively conduct a threat hunt. By the end of this cyber threat hunting book, you'll be able to identify the processes of handicapping an immature cyber threat hunt team and systematically progress the hunting capabilities to maturity. What you will learn Understand what is required to conduct a threat hunt Know everything your team needs to concentrate on for a successful hunt Discover why intelligence must be included in a threat hunt Recognize the phases of planning in order to prioritize efforts Balance the considerations concerning toolset selection and employment Achieve a mature team without wasting your resources Who this book is for This book is for anyone interested in learning how to organize and execute effective cyber threat hunts, establishing extra defense capabilities within their company, and wanting to mature an organization's cybersecurity posture. It will also be useful for anyone looking for a framework to help a hunt team grow and evolve. 
650 0 |a Computer networks  |x Security measures  |x Design 
700 1 |a Thompson, Jeremy  |e MitwirkendeR  |4 ctb 
700 1 |a Copeland, William  |e MitwirkendeR  |4 ctb 
700 1 |a Particini, Anthony  |e MitwirkendeR  |4 ctb 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781803242996/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-081559577
_version_ 1818767252074266624
adam_text
any_adam_object
author Maurice, Chad
author2 Thompson, Jeremy
Copeland, William
Particini, Anthony
author2_role ctb
ctb
ctb
author2_variant j t jt
w c wc
a p ap
author_facet Maurice, Chad
Thompson, Jeremy
Copeland, William
Particini, Anthony
author_role aut
author_sort Maurice, Chad
author_variant c m cm
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)081559577
(DE-599)KEP081559577
(ORHE)9781803242996
dewey-full 005.87
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.87
dewey-search 005.87
dewey-sort 15.87
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03933cam a22003972 4500</leader><controlfield tag="001">ZDB-30-ORH-081559577</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121706.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">220815s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781803237282</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-80323-728-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1803237287</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-80323-728-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781803242996</subfield><subfield code="9">978-1-80324-299-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)081559577</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP081559577</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781803242996</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)081559577</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.87</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Maurice, Chad</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The Foundations of Threat Hunting</subfield><subfield code="b">Organize and Design Effective Cyber Threat Hunts to Meet Business Needs</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing, Limited</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (246 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Build and mature a threat hunting team capable of repeatably stalking and trapping advanced adversaries in the darkest parts of an enterprise Key Features Learn foundational concepts for effective threat hunting teams in pursuit of cyber adversaries Recognize processes and requirements for executing and conducting a hunt Customize a defensive cyber framework needed to grow and mature a hunt team Book Description Threat hunting is a concept that takes traditional cyber defense and spins it onto its head. It moves the bar for network defenses beyond looking at the known threats and allows a team to pursue adversaries that are attacking in novel ways that have not previously been seen. To successfully track down and remove these advanced attackers, a solid understanding of the foundational concepts and requirements of the threat hunting framework is needed. Moreover, to confidently employ threat hunting in a business landscape, the same team will need to be able to customize that framework to fit a customer's particular use case. This book breaks down the fundamental pieces of a threat hunting team, the stages of a hunt, and the process that needs to be followed through planning, execution, and recovery. It will take you through the process of threat hunting, starting from understanding cybersecurity basics through to the in-depth requirements of building a mature hunting capability. This is provided through written instructions as well as multiple story-driven scenarios that show the correct (and incorrect) way to effectively conduct a threat hunt. By the end of this cyber threat hunting book, you'll be able to identify the processes of handicapping an immature cyber threat hunt team and systematically progress the hunting capabilities to maturity. What you will learn Understand what is required to conduct a threat hunt Know everything your team needs to concentrate on for a successful hunt Discover why intelligence must be included in a threat hunt Recognize the phases of planning in order to prioritize efforts Balance the considerations concerning toolset selection and employment Achieve a mature team without wasting your resources Who this book is for This book is for anyone interested in learning how to organize and execute effective cyber threat hunts, establishing extra defense capabilities within their company, and wanting to mature an organization's cybersecurity posture. It will also be useful for anyone looking for a framework to help a hunt team grow and evolve.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Design</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thompson, Jeremy</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Copeland, William</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Particini, Anthony</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781803242996/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-081559577
illustrated Not Illustrated
indexdate 2024-12-18T08:46:55Z
institution BVB
isbn 9781803237282
1803237287
9781803242996
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (246 pages)
psigel ZDB-30-ORH
publishDate 2022
publishDateSearch 2022
publishDateSort 2022
publisher Packt Publishing, Limited
record_format marc
spelling Maurice, Chad VerfasserIn aut
The Foundations of Threat Hunting Organize and Design Effective Cyber Threat Hunts to Meet Business Needs
Birmingham Packt Publishing, Limited 2022
1 online resource (246 pages)
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Build and mature a threat hunting team capable of repeatably stalking and trapping advanced adversaries in the darkest parts of an enterprise Key Features Learn foundational concepts for effective threat hunting teams in pursuit of cyber adversaries Recognize processes and requirements for executing and conducting a hunt Customize a defensive cyber framework needed to grow and mature a hunt team Book Description Threat hunting is a concept that takes traditional cyber defense and spins it onto its head. It moves the bar for network defenses beyond looking at the known threats and allows a team to pursue adversaries that are attacking in novel ways that have not previously been seen. To successfully track down and remove these advanced attackers, a solid understanding of the foundational concepts and requirements of the threat hunting framework is needed. Moreover, to confidently employ threat hunting in a business landscape, the same team will need to be able to customize that framework to fit a customer's particular use case. This book breaks down the fundamental pieces of a threat hunting team, the stages of a hunt, and the process that needs to be followed through planning, execution, and recovery. It will take you through the process of threat hunting, starting from understanding cybersecurity basics through to the in-depth requirements of building a mature hunting capability. This is provided through written instructions as well as multiple story-driven scenarios that show the correct (and incorrect) way to effectively conduct a threat hunt. By the end of this cyber threat hunting book, you'll be able to identify the processes of handicapping an immature cyber threat hunt team and systematically progress the hunting capabilities to maturity. What you will learn Understand what is required to conduct a threat hunt Know everything your team needs to concentrate on for a successful hunt Discover why intelligence must be included in a threat hunt Recognize the phases of planning in order to prioritize efforts Balance the considerations concerning toolset selection and employment Achieve a mature team without wasting your resources Who this book is for This book is for anyone interested in learning how to organize and execute effective cyber threat hunts, establishing extra defense capabilities within their company, and wanting to mature an organization's cybersecurity posture. It will also be useful for anyone looking for a framework to help a hunt team grow and evolve.
Computer networks Security measures Design
Thompson, Jeremy MitwirkendeR ctb
Copeland, William MitwirkendeR ctb
Particini, Anthony MitwirkendeR ctb
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781803242996/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Maurice, Chad
The Foundations of Threat Hunting Organize and Design Effective Cyber Threat Hunts to Meet Business Needs
Computer networks Security measures Design
title The Foundations of Threat Hunting Organize and Design Effective Cyber Threat Hunts to Meet Business Needs
title_auth The Foundations of Threat Hunting Organize and Design Effective Cyber Threat Hunts to Meet Business Needs
title_exact_search The Foundations of Threat Hunting Organize and Design Effective Cyber Threat Hunts to Meet Business Needs
title_full The Foundations of Threat Hunting Organize and Design Effective Cyber Threat Hunts to Meet Business Needs
title_fullStr The Foundations of Threat Hunting Organize and Design Effective Cyber Threat Hunts to Meet Business Needs
title_full_unstemmed The Foundations of Threat Hunting Organize and Design Effective Cyber Threat Hunts to Meet Business Needs
title_short The Foundations of Threat Hunting
title_sort foundations of threat hunting organize and design effective cyber threat hunts to meet business needs
title_sub Organize and Design Effective Cyber Threat Hunts to Meet Business Needs
topic Computer networks Security measures Design
topic_facet Computer networks Security measures Design
url https://learning.oreilly.com/library/view/-/9781803242996/?ar
work_keys_str_mv AT mauricechad thefoundationsofthreathuntingorganizeanddesigneffectivecyberthreathuntstomeetbusinessneeds
AT thompsonjeremy thefoundationsofthreathuntingorganizeanddesigneffectivecyberthreathuntstomeetbusinessneeds
AT copelandwilliam thefoundationsofthreathuntingorganizeanddesigneffectivecyberthreathuntstomeetbusinessneeds
AT particinianthony thefoundationsofthreathuntingorganizeanddesigneffectivecyberthreathuntstomeetbusinessneeds
AT mauricechad foundationsofthreathuntingorganizeanddesigneffectivecyberthreathuntstomeetbusinessneeds
AT thompsonjeremy foundationsofthreathuntingorganizeanddesigneffectivecyberthreathuntstomeetbusinessneeds
AT copelandwilliam foundationsofthreathuntingorganizeanddesigneffectivecyberthreathuntstomeetbusinessneeds
AT particinianthony foundationsofthreathuntingorganizeanddesigneffectivecyberthreathuntstomeetbusinessneeds