Nederlands
nl
English
en
contact veelgestelde vragen
log in
VU
 
Applied Incident Response
Hoofdkenmerken
Auteur: Steve Anson
Titel: Applied Incident Response
Uitgever: Wiley Professional Development (P&T)
ISBN: 9781119560319
ISBN boekversie: 9781119560265
Editie: 1
Prijs: € 37.16
Verschijningsdatum: 14-01-2020
Inhoudelijke kenmerken
Categorie: Security
Taal: English
Imprint: John Wiley \u0026 Sons P\u0026T
Technische kenmerken
Verschijningsvorm: E-book
 

Inhoudsopgave:

\u003cp\u003eIncident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary.\u0026nbsp;\u0026nbsp;\u003ci\u003eApplied Incident Response\u003c/i\u003e\u0026nbsp;details effective ways to respond to advanced attacks against local and remote network resources,\u0026nbsp;providing proven response techniques and a framework through which to apply them.\u0026nbsp; As a starting point for new incident handlers, or as a technical reference for hardened IR veterans, this book details the latest techniques for responding to threats against your network, including:\u003c/p\u003e \u003cul\u003e \u003cli\u003ePreparing your environment for effective incident response\u003c/li\u003e \u003cli\u003eLeveraging MITRE ATT\u0026amp;CK and threat intelligence for active network defense\u003c/li\u003e \u003cli\u003eLocal and remote triage of systems using PowerShell, WMIC, and open-source tools\u003c/li\u003e \u003cli\u003eAcquiring RAM and disk images locally and remotely\u003c/li\u003e \u003cli\u003eAnalyzing RAM with Volatility and Rekall\u003c/li\u003e \u003cli\u003eDeep-dive forensic analysis of system drives using open-source or commercial tools\u003c/li\u003e \u003cli\u003eLeveraging Security Onion and Elastic Stack for network security monitoring\u003c/li\u003e \u003cli\u003eTechniques for log analysis and aggregating high-value logs\u003c/li\u003e \u003cli\u003eStatic and dynamic analysis of malware with YARA rules, FLARE VM, and Cuckoo Sandbox\u003c/li\u003e \u003cli\u003eDetecting and responding to lateral movement techniques, including pass-the-hash, pass-the-ticket, Kerberoasting, malicious use of PowerShell, and many more\u003c/li\u003e \u003cli\u003eEffective threat hunting techniques\u003c/li\u003e \u003cli\u003eAdversary emulation with Atomic Red Team\u003c/li\u003e \u003cli\u003eImproving preventive and detective controls\u003c/li\u003e \u003c/ul\u003e
leveringsvoorwaarden privacy statement copyright disclaimer veelgestelde vragen contact
 
VUBOEKHANDEL.NL VU Boekhandel boekverkopers sinds 1967