
Detect and investigate various cyber threats and techniques carried out by malicious actors by analyzing logs generated from different sources Purchase of the print or Kindle book includes a free PDF eBook
This book is for Security Operation Center (SOC) analysts, security professionals, cybersecurity incident investigators, incident handlers, incident responders, or anyone looking to explore attacker techniques and delve deeper into detecting and investigating attacks. If you want to efficiently detect and investigate cyberattacks by analyzing logs generated from different log sources, then this is the book for you. Basic knowledge of cybersecurity and networking domains and entry-level security concepts are necessary to get the most out of this book.
Auteur(s): Yahia, Mostafa
Editeur: Packt Publishing
Année de Publication: 2023
pages: 314
Langue: lang_en
ISBN: 978-1-83763-478-1
eISBN: 978-1-83763-875-8
Detect and investigate various cyber threats and techniques carried out by malicious actors by analyzing logs generated from different sources Purchase of the print or Kindle book includes a free PDF eBook
This book is for Security Operation Center (SOC) analysts, security professionals, cybersecurity incident investigators, incident handlers, incident responders, or anyone looking to explore attacker techniques and delve deeper into detecting and investigating attacks. If you want to efficiently detect and investigate cyberattacks by analyzing logs generated from different log sources, then this is the book for you. Basic knowledge of cybersecurity and networking domains and entry-level security concepts are necessary to get the most out of this book.