logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Effective Threat Investigation For Soc Analysts The Ultimate Guide To Examining Various Threats And Attacker Techniques Using Security Logs 1st Edition Mostafa Yahia

  • SKU: BELL-52169198
Effective Threat Investigation For Soc Analysts The Ultimate Guide To Examining Various Threats And Attacker Techniques Using Security Logs 1st Edition Mostafa Yahia
$ 31.00 $ 45.00 (-31%)

5.0

110 reviews

Effective Threat Investigation For Soc Analysts The Ultimate Guide To Examining Various Threats And Attacker Techniques Using Security Logs 1st Edition Mostafa Yahia instant download after payment.

Publisher: Packt Publishing
File Extension: PDF
File size: 24 MB
Pages: 314
Author: Mostafa Yahia
ISBN: 9781837634781, 1837634785
Language: English
Year: 2023
Edition: 1

Product desciption

Effective Threat Investigation For Soc Analysts The Ultimate Guide To Examining Various Threats And Attacker Techniques Using Security Logs 1st Edition Mostafa Yahia by Mostafa Yahia 9781837634781, 1837634785 instant download after payment.

Detect and investigate various cyber threats and techniques carried out by malicious actors by analyzing logs generated from different sources
 

Effective threat investigation requires strong technical expertise, analytical skills, and a deep understanding of cyber threats and attacker techniques. It’s a crucial skill for SOC analysts, enabling them to analyze different threats and identify security incident origins. This book provides insights into the most common cyber threats and various attacker techniques to help you hone your incident investigation skills.
 
The book begins by explaining phishing and email attack types and how to detect and investigate them, along with Microsoft log types such as Security, System, PowerShell, and their events. Next, you’ll learn how to detect and investigate attackers’ techniques and malicious activities within Windows environments. As you make progress, you’ll find out how to analyze the firewalls, flows, and proxy logs, as well as detect and investigate cyber threats using various security solution alerts, including EDR, IPS, and IDS. You’ll also explore popular threat intelligence platforms such as VirusTotal, AbuseIPDB, and X-Force for investigating cyber threats and successfully build your own sandbox environment for effective malware analysis.
 
What you will learn
• Get familiarized with and investigate various threat types and attacker techniques
• Analyze email security solution logs and understand email flow and headers
• Find out how to analyze Microsoft event logs
• Practical investigation of the various Windows threats and attacks
• Analyze web proxy logs to investigate C&C communication attributes
• Understand web application firewall (WAF) logs and examine various external attacks
• Analyze FW logs and security alerts to investigate cyber threats
• Understand the role of CTI in investigation and identify potential threats

Related Products