Other Books You May Enjoy
If you enjoyed this book, you may be interested in these other books by Packt:
Effective Threat Investigation for SOC Analysts
Mostafa Yahia
ISBN: 978-1-83763-478-1
- Get familiarized with and investigate various threat types and attacker techniques
- Analyze email security solution logs and understand email flow and headers
- Practically investigate various Windows threats and attacks
- Analyze web proxy logs to investigate C&C communication attributes
- Leverage WAF and FW logs and CTI to investigate various cyber attacks
Security Monitoring with Wazuh
Rajneesh Gupta
ISBN: 978-1-83763-215-2
- Find out how to set up an intrusion detection system with Wazuh
- Get to grips with setting up a file integrity monitoring system
- Deploy Malware Information Sharing Platform (MISP) for threat intelligence automation to detect indicators of compromise...