Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Mastering Cyber Intelligence
Mastering Cyber Intelligence

Mastering Cyber Intelligence: Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense

eBook
€26.98 €29.99
Paperback
€36.99
Subscription
Free Trial
Renews at €18.99p/m

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Table of content icon View table of contents Preview book icon Preview Book

Mastering Cyber Intelligence

Left arrow icon Right arrow icon

Key benefits

  • Build the analytics skills and practices you need for analyzing, detecting, and preventing cyber threats
  • Learn how to perform intrusion analysis using the cyber threat intelligence (CTI) process
  • Integrate threat intelligence into your current security infrastructure for enhanced protection

Description

The sophistication of cyber threats, such as ransomware, advanced phishing campaigns, zero-day vulnerability attacks, and advanced persistent threats (APTs), is pushing organizations and individuals to change strategies for reliable system protection. Cyber Threat Intelligence converts threat information into evidence-based intelligence that uncovers adversaries' intents, motives, and capabilities for effective defense against all kinds of threats. This book thoroughly covers the concepts and practices required to develop and drive threat intelligence programs, detailing the tasks involved in each step of the CTI lifecycle. You'll be able to plan a threat intelligence program by understanding and collecting the requirements, setting up the team, and exploring the intelligence frameworks. You'll also learn how and from where to collect intelligence data for your program, considering your organization level. With the help of practical examples, this book will help you get to grips with threat data processing and analysis. And finally, you'll be well-versed with writing tactical, technical, and strategic intelligence reports and sharing them with the community. By the end of this book, you'll have acquired the knowledge and skills required to drive threat intelligence operations from planning to dissemination phases, protect your organization, and help in critical defense decisions.

Who is this book for?

This book is for security professionals, researchers, and individuals who want to gain profound knowledge of cyber threat intelligence and discover techniques to prevent varying types of cyber threats. Basic knowledge of cybersecurity and network fundamentals is required to get the most out of this book.

What you will learn

  • Understand the CTI lifecycle which makes the foundation of the study
  • Form a CTI team and position it in the security stack
  • Explore CTI frameworks, platforms, and their use in the program
  • Integrate CTI in small, medium, and large enterprises
  • Discover intelligence data sources and feeds
  • Perform threat modelling and adversary and threat analysis
  • Find out what Indicators of Compromise (IoCs) are and apply the pyramid of pain in threat detection
  • Get to grips with writing intelligence reports and sharing intelligence

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Apr 29, 2022
Length: 528 pages
Edition : 1st
Language : English
ISBN-13 : 9781800208285
Category :
Concepts :

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Product Details

Publication date : Apr 29, 2022
Length: 528 pages
Edition : 1st
Language : English
ISBN-13 : 9781800208285
Category :
Concepts :

Packt Subscriptions

See our plans and pricing
Modal Close icon
€18.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
€189.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts
€264.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total 105.97
The Foundations of Threat Hunting
€31.99
Mastering Cyber Intelligence
€36.99
Incident Response Techniques for Ransomware Attacks
€36.99
Total 105.97 Stars icon

Table of Contents

19 Chapters
Section 1: Cyber Threat Intelligence Life Cycle, Requirements, and Tradecraft Chevron down icon Chevron up icon
Chapter 1: Cyber Threat Intelligence Life Cycle Chevron down icon Chevron up icon
Chapter 2: Requirements and Intelligence Team Implementation Chevron down icon Chevron up icon
Chapter 3: Cyber Threat Intelligence Frameworks Chevron down icon Chevron up icon
Chapter 4: Cyber Threat Intelligence Tradecraft and Standards Chevron down icon Chevron up icon
Chapter 5: Goal Setting, Procedures for CTI Strategy, and Practical Use Cases Chevron down icon Chevron up icon
Section 2: Cyber Threat Analytical Modeling and Defensive Mechanisms Chevron down icon Chevron up icon
Chapter 6: Cyber Threat Modeling and Adversary Analysis Chevron down icon Chevron up icon
Chapter 7: Threat Intelligence Data Sources Chevron down icon Chevron up icon
Chapter 8: Effective Defense Tactics and Data Protection Chevron down icon Chevron up icon
Chapter 9: AI Applications in Cyber Threat Analytics Chevron down icon Chevron up icon
Chapter 10: Threat Modeling and Analysis – Practical Use Cases Chevron down icon Chevron up icon
Section 3: Integrating Cyber Threat Intelligence Strategy to Business processes Chevron down icon Chevron up icon
Chapter 11: Usable Security: Threat Intelligence as Part of the Process Chevron down icon Chevron up icon
Chapter 12: SIEM Solutions and Intelligence-Driven SOCs Chevron down icon Chevron up icon
Chapter 13: Threat Intelligence Metrics, Indicators of Compromise, and the Pyramid of Pain Chevron down icon Chevron up icon
Chapter 14: Threat Intelligence Reporting and Dissemination Chevron down icon Chevron up icon
Chapter 15: Threat Intelligence Sharing and Cyber Activity Attribution – Practical Use Cases Chevron down icon Chevron up icon
Other Books You May Enjoy Chevron down icon Chevron up icon

Customer reviews

Rating distribution
Full star icon Full star icon Full star icon Half star icon Empty star icon 3.5
(4 Ratings)
5 star 50%
4 star 0%
3 star 25%
2 star 0%
1 star 25%
Geronimo P. Anselm Aug 18, 2022
Full star icon Full star icon Full star icon Full star icon Full star icon 5
This is the best cyber threat intel book I've read so far. It's comprehensive and detailed, explaining theory and providing practical instructions and tools. It covers all steps of the CTI cycle.
Amazon Verified review Amazon
Amazon Customer Aug 12, 2022
Full star icon Full star icon Full star icon Full star icon Full star icon 5
This book is very intelligently organized into three sections: information on cyber threats and requirements for systems, threat modeling and defense, and integrating the defense strategy into business processes. Section 1 begins with a treatment of the threat lifecycle and requirements for implementing a team, coverage of actual real vendor frameworks, discussion of tradecraft and standards, and setting goals and procedures for CTI strategy, including practical use cases. Section 2 begins with cyber threat modeling and adversary analysis, then on to data sources to gain threat intelligence, including open sources. Protecting data and defense tactics have an entire chapter of their own. Use of artificial intelligence is also covered, and then practical use cases for threat modeling and analysis. Section 3 continues with processes and methods for integrating defense into business processes. This begins with technical needs and guidelines, data privacy, social engineering, and more. A chapter is devoted to SOCs. Other topics include threat intelligence metrics, the pyramid of pain, reporting, and wraps up with threat intelligence sharing and cyber activity concerns.
Amazon Verified review Amazon
G Aug 05, 2024
Full star icon Full star icon Full star icon Empty star icon Empty star icon 3
I'm ex-NCSC, have been a CTI consultant for one of the big names in the business, sit on a university oversight board for cyber courses and have built and run CTI teams for several major organisations so hopefully I can speak on the topic with some authority. The author has my sympathy in trying to condense what can be an entire career of information in to one publication and, all told, has not done a horrible job. I'm giving it three stars though for two significant issues. The first is the all-too-common issue in the industry of placing too much emphasis on CTI supporting Security Operations and focussing far too much on IOCs - while a necessary customer set, this creates a defensive mind set that devalues intelligence that allows an organisation to be proactive in ensuring cyber attacks against it fail (to borrow from the excellent ThreatConnect example, build a wall 10ft in front of the reactor exhaust port, don't worry about how effective your TIE fighters are in shooting down X-wings !). The second is the lack of mention of the fourth key level of delivery (beyond strategic, operational and tactical - the last two of which the author gives in the opposite way round to how many in the business use them incidentally) which is staff awareness. In security, staff are either your best friend or your worst enemy so CTI working with awareness and training teams is absolutely critical. On the whole, the book has many good bits but it is clearly written by a techie rather than someone with an intel or business risk background and that does lead to some myopia. As I say though, that tends to be true of about 90% of discussions on the topic unfortunately and is probably why CTI is still relatively undervalued.
Amazon Verified review Amazon
Anonymous Oct 08, 2022
Full star icon Empty star icon Empty star icon Empty star icon Empty star icon 1
I wanted to read this book as I saw it was mentioned on several groups and sites I follow. So when I started reading it I had high hopes that this would be a good read. I was utterly disappointed!The author clearly show that he has no knowledge about the intelligence process, how it works and what should be done and in which order. One could argue that since it is Cyber Threat Intelligence (CTI) one can have some leeway. However, CTI is a sub-set of Threat Intelligence (TI) which is a sub-set of Intelligence, thus there are already established elements and definitions. The author seems to have made stuff up as he went a long.For example, in chapter 2 he is misrepresenting such a simple thing as Intelligence Requirements Management. Here the author is claiming that "Short-Term Requirements" is the same as Prioritized Intelligence Requirement (PIR), and "Medium-Term Requirements" is equal to Specific Intelligence Requirements (SIR)... Which is not correct. Together with a stakeholder you will define what Intelligence Requirements they have. Based in this you will build and prioritise PIRs and then you will have to break each PIR into SIRs and each SIR into Essential Elements of information (EEIs).Throughout the book, the author is completely and thoroughly butchering everything I love about cyber threat intelligence and I catch myself screaming at the screen!
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an eBook? Chevron down icon Chevron up icon

Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.

If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.

Please Note: Packt eBooks are non-returnable and non-refundable.

Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your eBook for your own use onto any machine
  • You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:

  1. Register on our website using your email address and the password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title. 
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook? Chevron down icon Chevron up icon
  • If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us
What eBook formats do Packt support? Chevron down icon Chevron up icon

Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.

You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.

What are the benefits of eBooks? Chevron down icon Chevron up icon
  • You can get the information you need immediately
  • You can easily take them with you on a laptop
  • You can download them an unlimited number of times
  • You can print them out
  • They are copy-paste enabled
  • They are searchable
  • There is no password protection
  • They are lower price than print
  • They save resources and space
What is an eBook? Chevron down icon Chevron up icon

Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.

When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.

For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.