Threat Hunting with Splunk信息安全资料 .docxVIP

  • 0
  • 0
  • 约8.43万字
  • 约 79页
  • 2026-02-10 发布于浙江
  • 举报

ThreatHuntingwithSplunk:PracticalTechniquesandAPTDetection

OmarBorg

PublishedbyOmarBorg,2023.

TableofContents

TitlePage

ThreatHuntingwithSplunk:PracticalTechniquesandAPTDetection

Introduction

Chapter1:SettingUpYourThreatHuntingEnvironment

Chapter2:BasicSplunkCommands

Chapter3:BuildingYourThreatHuntingQueries

Chapter4:PracticalExamplesofThreatHunting

Chapter5:ThreatIntelligenceandAPTs

Chapter6:HuntingforAPTs

Chapter7:AdvancedThreatHuntingTechniques

Chapter8:IncidentResponseandRemediation

Chapter9:BestPracticesandPitfallstoAvoid

Chapter10:TheFutureofThreatHunting

Chapter1:SettingUpYourThreatHuntingEnvironment

Chapter2:BasicSplunkCommands

Chapter3:BuildingYourThreatHuntingQueries

Chapter4:PracticalExamplesofThreatHunting

Chapter5:ThreatIntelligenceandAPTs

Chapter6:HuntingforAPTs

Chapter7:IncidentResponseandRemediation

Chapter7.1:IncidentResponseandRemediationwithYaraRules

Chapter8:ThreatIntelligenceandThreatSharing

Chapter9:SecurityAutomationandOrchestrationwithSplunk

Chapter10:ComplianceMonitoringandReportingwithSplunk

AppendixB:GlossaryofTerms

Title:ThreatHuntingwithSplunk:PracticalTechniquesandAPTDetection

TableofContents

Introduction

MasteringSecurityandCompliancewithSplunk

Inanincreasinglyinterconnectedanddigitizedworld,thesignificanceofrobustcybersecurityandunwaveringcompliancecannotbeoverstated.Organizationsofallsizesfaceamultitudeofthreats,fromsophisticatedcyberattackstoregulatorycomplexitiesthatdemanddiligenceandvigilance.Inthiserawheredatareignssupreme,safeguardingsensitiveinformationandensuringadherencetoindustrystandardsandregulationshavebecomeparamount.

Thisbookembarksonacomprehensivejourneythroughtheintricatelandscapeofcybersecurity,threatdetection,incidentresponse,andcompliancemonitoring,allwithonepowerfulallya

文档评论(0)

1亿VIP精品文档

相关文档