Summary
In this last chapter, you had the opportunity to apply some of the IR concepts learned in this book.
From a security breach incident, you opened and managed a case and started an investigation by analyzing events and behaviors detected from network traffic monitoring and the centralization of logs from different systems in the corporate network.
Additionally, you learned to perform network traffic and file analysis to get valuable artifacts for your investigation.
I sincerely hope that this book will be helpful for you, whether it is for your professional development as reference material or simply for you to learn something new.
Knowledge evolves quickly, and environments and tools change frequently, so I invite you to visit the repository of this book (https://github.com/PacktPublishing/Incident-Response-with-Threat-Intelligence), where you will find updated versions of the tools mentioned in the book and additional tools that will help complement your knowledge...