Have a personal or library account? Click to login
Mastering Cyber Intelligence: Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense Cover

Mastering Cyber Intelligence: Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense

Chapter in the book
Paid access
|May 2022
Table of contents

Table of Contents

  1. Cyber Threat Intelligence Life Cycle
  2. Requirements and Intelligent Team Implementation
  3. Cyber Threat Intelligence Frameworks
  4. Cyber Threat Intelligence Tradecraft and Standards
  5. Goals Setting, procedures for CTI Strategy, and Practical Use Cases
  6. Cyber Threat Modeling and Adversary Analysis
  7. Threat Intelligence Data Sources
  8. Effective Defensive Tactics and Data Protection
  9. AI Application in Cyber Threat Analytics
  10. Threat Modeling and Analysis: - Practical Use Cases
  11. Usable Security: Threat Intelligence as part of the process
  12. SIEM Solutions and Intelligence-driven SOCs
  13. Threat Intelligence Metrics, Indicators of Compromise, and the Pyramid of Pain
  14. Threat Intelligence Reporting and Dissemination
  15. Threat Intelligence Sharing and Cyber Activity Attribution: Practical Use Cases

PDF preview is not available for this content.

PDF ISBN: 978-1-80020-828-5
Publisher: Packt Publishing Limited
Copyright owner: © 2022 Packt Publishing Limited
Publication date: 2022
Language: English
Pages: 528
Mastering Cyber Intelligence