Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs

Learn cyber threat intelligence fundamentals to implement and operationalize an organizational intelligence programKey Features: Develop and implement...
CHF 94.85
CHF 94.85
SKU: 9781801814683
Product Type: Books
Please hurry! Only 162 left in stock
Author: Kyle Wilhoit
Format: Paperback
Language: English
Subtotal: CHF 94.85
10 customers are viewing this product
Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs by Wilhoit, Kyle

Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs

CHF 94.85

Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs

CHF 94.85
Author: Kyle Wilhoit
Format: Paperback
Language: English

Learn cyber threat intelligence fundamentals to implement and operationalize an organizational intelligence program


Key Features:

  • Develop and implement a threat intelligence program from scratch
  • Discover techniques to perform cyber threat intelligence, collection, and analysis using open-source tools
  • Leverage a combination of theory and practice that will help you prepare a solid foundation for operationalizing threat intelligence programs


Book Description:

We're living in an era where cyber threat intelligence is becoming more important. Cyber threat intelligence routinely informs tactical and strategic decision-making throughout organizational operations. However, finding the right resources on the fundamentals of operationalizing a threat intelligence function can be challenging, and that's where this book helps.


In Operationalizing Threat Intelligence, you'll explore cyber threat intelligence in five fundamental areas - defining threat intelligence, developing threat intelligence, collecting threat intelligence, enrichment and analysis, and finally production of threat intelligence. You'll start by finding out what threat intelligence is and where it can be applied. Next, you'll discover techniques for performing cyber threat intelligence collection and analysis using open-source tools. The book also examines commonly used frameworks and policies as well as fundamental operational security concepts. Later, you'll focus on enriching and analyzing threat intelligence through pivoting and threat hunting. Finally, you'll examine detailed mechanisms for the production of intelligence.


By the end of this book, you'll be equipped with the right tools and have understood what it takes to operationalize your own threat intelligence function, from collection to production.


What You Will Learn:

  • Discover types of threat actors and their common tactics and techniques
  • Understand the core tenets of cyber threat intelligence
  • Discover cyber threat intelligence policies, procedures, and frameworks
  • Explore the fundamentals relating to collecting cyber threat intelligence
  • Understand fundamentals about threat intelligence enrichment and analysis
  • Understand what threat hunting and pivoting are, along with examples
  • Focus on putting threat intelligence into production
  • Explore techniques for performing threat analysis, pivoting, and hunting


Who this book is for:

This book is for cybersecurity professionals, security analysts, security enthusiasts, and anyone who is just getting started and looking to explore threat intelligence in more detail. Those working in different security roles will also be able to explore threat intelligence with the help of this security book.

Author: Kyle Wilhoit, Joseph Opacki
Publisher: Packt Publishing
Published: 06/17/2022
Pages: 460
Binding Type: Paperback
Weight: 1.73lbs
Size: 9.25h x 7.50w x 0.93d
ISBN: 9781801814683

This title is not returnable

Returns Policy

You may return most new, unopened items within 30 days of delivery for a full refund. We'll also pay the return shipping costs if the return is a result of our error (you received an incorrect or defective item, etc.).

You should expect to receive your refund within four weeks of giving your package to the return shipper, however, in many cases you will receive a refund more quickly. This time period includes the transit time for us to receive your return from the shipper (5 to 10 business days), the time it takes us to process your return once we receive it (3 to 5 business days), and the time it takes your bank to process our refund request (5 to 10 business days).

If you need to return an item, simply login to your account, view the order using the "Complete Orders" link under the My Account menu and click the Return Item(s) button. We'll notify you via e-mail of your refund once we've received and processed the returned item.

Shipping

We can ship to virtually any address in the world. Note that there are restrictions on some products, and some products cannot be shipped to international destinations.

When you place an order, we will estimate shipping and delivery dates for you based on the availability of your items and the shipping options you choose. Depending on the shipping provider you choose, shipping date estimates may appear on the shipping quotes page.

Please also note that the shipping rates for many items we sell are weight-based. The weight of any such item can be found on its detail page. To reflect the policies of the shipping companies we use, all weights will be rounded up to the next full pound.

Related Products

Recently Viewed Products