Section 3: Host and Network-Based Analysis
This section will teach the reader about the importance of host-based analysis, key endpoint security technologies, and how to use built-in tools within Windows and Linux to perform security analysis on the host computer. This section will also introduce the reader to network-based analysis and techniques and computer forensics.
This section contains the following chapters:
- Chapter 7, Delving into Endpoint Threat Analysis
- Chapter 8, Interpreting Endpoint Security
- Chapter 9, Exploring Computer Forensics
- Chapter 10, Performing Intrusion Analysis