
ACTIVE THREAT DETECTION IN IT SYSTEMS
A successful attack on an organization's information system can have very serious consequences. In recent years, cybersecurity analysts have been trying to anticipate threats and neutralize them before major damage occurs to the system. This approach requires continuous testing and strengthening of defense mechanisms in the organization's information system. As part of these processes, many valuable data can be collected, used to build models, and thus better understand important issues related to IT security.
- Understand the basics of computer forensics and threat analysis.
- Learn how to model collected data and document research results.
- Master simulating aggressor actions in a laboratory environment.
- Implement early detection of security breaches.
- Learn the rules for effective communication with management and the business environment.
- Configure the necessary environment using open source tools.
- Use the Atomic Red Team test library and the MITRE ATT&CK framework.
This book is a practical guide to active techniques for detecting, analyzing, and neutralizing cyber threats. Thanks to it, even if you do not have specialist knowledge in this field, you can easily implement an effective program to actively secure your organization from scratch. You will learn how to detect attacks, how to collect data and use models to obtain valuable information from them. You will see that you can configure the necessary environment using open source tools. Thanks to numerous exercises, you will learn in practice how to use the Atomic Red Team test library, as well as the MITRE ATT&CK framework. In addition, you will gain skills related to documenting your activities, defining security indicators of the system, as well as communicating information about its violations to your colleagues, superiors and business partners.
Helion, known for its high-quality IT publications, puts a comprehensive tool in your hands that will help you build a secure IT environment. Regardless of whether you are a system administrator, security analyst or computer science student, this book will provide you with the necessary knowledge and skills.
Thanks to this book, you will gain skills related to documenting your activities, defining security indicators of the system, as well as communicating information about its violations to your colleagues, superiors and business partners. You will learn how to build bridges between the technical aspect of security and the business needs of the organization. It's simple. Search. Detect. Neutralize!
CARUNO-2025-12-03-08:56:40 cuSpecifications
| ISBN | 9788328388857 |
| Author | Valentina Costa-Gazcón |
| Format | 168x240 mm |
| Binding | broszurowa |
| Type | Książki |
| Number of pages | 344 |
| Edition | 1 |
| Year of publication | 2022 |
| Publisher | Helion |
Helion Active Threat Detection in IT Systems - A Guide to Cybersecurity
Gross price, incl. VAT
Shipping costs:
EAN: 9788328388857
