Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Operationalizing Threat Intelligence
Operationalizing Threat Intelligence

Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs

eBook
$9.99 $37.99
Paperback
$46.99
Audiobook
$9.99 $46.99
Subscription
Free Trial
Renews at $19.99p/m

What do you get with Audiobook?

Product feature icon Download a zip folder containing audio files (MP3) and a supplementary PDF
Product feature icon Access this title in our online player
Product feature icon DRM FREE - Listen whenever, wherever and however you want
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Key benefits

  • Develop and implement a threat intelligence program from scratch
  • Discover techniques to perform cyber threat intelligence, collection, and analysis using open-source tools
  • Leverage a combination of theory and practice that will help you prepare a solid foundation for operationalizing threat intelligence programs

Description

We’re living in an era where cyber threat intelligence is becoming more important. Cyber threat intelligence routinely informs tactical and strategic decision-making throughout organizational operations. However, finding the right resources on the fundamentals of operationalizing a threat intelligence function can be challenging, and that’s where this book helps. In Operationalizing Threat Intelligence, you’ll explore cyber threat intelligence in five fundamental areas: defining threat intelligence, developing threat intelligence, collecting threat intelligence, enrichment and analysis, and finally production of threat intelligence. You’ll start by finding out what threat intelligence is and where it can be applied. Next, you’ll discover techniques for performing cyber threat intelligence collection and analysis using open source tools. The book also examines commonly used frameworks and policies as well as fundamental operational security concepts. Later, you’ll focus on enriching and analyzing threat intelligence through pivoting and threat hunting. Finally, you’ll examine detailed mechanisms for the production of intelligence. By the end of this book, you’ll be equipped with the right tools and understand what it takes to operationalize your own threat intelligence function, from collection to production.

Who is this book for?

This book is for cybersecurity professionals, security analysts, security enthusiasts, and anyone who is just getting started and looking to explore threat intelligence in more detail. Those working in different security roles will also be able to explore threat intelligence with the help of this security book.

What you will learn

  • Discover types of threat actors and their common tactics and techniques
  • Understand the core tenets of cyber threat intelligence
  • Discover cyber threat intelligence policies, procedures, and frameworks
  • Explore the fundamentals relating to collecting cyber threat intelligence
  • Understand fundamentals about threat intelligence enrichment and analysis
  • Understand what threat hunting and pivoting are, along with examples
  • Focus on putting threat intelligence into production
  • Explore techniques for performing threat analysis, pivoting, and hunting

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Jun 17, 2022
Length: 11hrs 44mins
Edition : 1st
Language : English
ISBN-13 : 9781837632879
Category :
Concepts :
Tools :

What do you get with Audiobook?

Product feature icon Download a zip folder containing audio files (MP3) and a supplementary PDF
Product feature icon Access this title in our online player
Product feature icon DRM FREE - Listen whenever, wherever and however you want
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Product Details

Publication date : Jun 17, 2022
Length: 11hrs 44mins
Edition : 1st
Language : English
ISBN-13 : 9781837632879
Category :
Concepts :
Tools :

Packt Subscriptions

See our plans and pricing
Modal Close icon
$19.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
$199.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts
$279.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total $ 137.97
Mastering Cyber Intelligence
$48.99
The Foundations of Threat Hunting
$41.99
Operationalizing Threat Intelligence
$46.99
Total $ 137.97 Stars icon
Banner background image

Table of Contents

17 Chapters
Section 1: What Is Threat Intelligence? Chevron down icon Chevron up icon
Chapter 1: Why You Need a Threat Intelligence Program Chevron down icon Chevron up icon
Chapter 2: Threat Actors, Campaigns, and Tooling Chevron down icon Chevron up icon
Chapter 3: Guidelines and Policies Chevron down icon Chevron up icon
Chapter 4: Threat Intelligence Frameworks, Standards, Models, and Platforms Chevron down icon Chevron up icon
Section 2: How to Collect Threat Intelligence Chevron down icon Chevron up icon
Chapter 5: Operational Security (OPSEC) Chevron down icon Chevron up icon
Chapter 6: Technical Threat Intelligence – Collection Chevron down icon Chevron up icon
Chapter 7: Technical Threat Analysis – Enrichment Chevron down icon Chevron up icon
Chapter 8: Technical Threat Analysis – Threat Hunting and Pivoting Chevron down icon Chevron up icon
Chapter 9: Technical Threat Analysis – Similarity Analysis Chevron down icon Chevron up icon
Section 3: What to Do with Threat Intelligence Chevron down icon Chevron up icon
Chapter 10: Preparation and Dissemination Chevron down icon Chevron up icon
Chapter 11: Fusion into Other Enterprise Operations Chevron down icon Chevron up icon
Chapter 12: Overview of Datasets and Their Practical Application Chevron down icon Chevron up icon
Chapter 13: Conclusion Chevron down icon Chevron up icon
Other Books You May Enjoy Chevron down icon Chevron up icon

Customer reviews

Top Reviews
Rating distribution
Full star icon Full star icon Full star icon Full star icon Half star icon 4.6
(14 Ratings)
5 star 78.6%
4 star 14.3%
3 star 0%
2 star 7.1%
1 star 0%
Filter icon Filter
Top Reviews

Filter reviews by




Amazon User Jun 25, 2022
Full star icon Full star icon Full star icon Full star icon Full star icon 5
This book is the closest you're going to get to a step-by-step guide on how to establish a full-fledged cyber threat intelligence apparatus in a methodical, scalable, cost-effective, and impactful way. It thoroughly explores both strategic and tactical elements of cyber threat intelligence work and demystifies the "aura" around it that has been pervasively parroted by industry marketing for nearly a decade. No matter what position you hold at your organization (individual contributor, manager, or executive), if you're interested in Cyber Threat Intelligence, this book is for you.
Amazon Verified review Amazon
Michael Sep 18, 2022
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Evolving an intel program from ideation to operationalization can be difficult; and this book is an excellent resource to help make the journey easier for practitioners and planners alike.It captures the foundational concepts necessary to jumpstart or enhance an intelligence program using stakeholder requirements as a baseline - an absolute MUST for any successful intelligence program. The authors are effective translating concept into practice using practical examples of tools and methodologies that can be used and tweaked in any environment.A welcome addition to any CTI library. Well done Joe and Kyle!
Amazon Verified review Amazon
J Sep 06, 2022
Full star icon Full star icon Full star icon Full star icon Full star icon 5
This plainly worded but comprehensive book is a fantastic guide to building structure in operations that work with digital threats and abuse mitigation.
Amazon Verified review Amazon
Amazon Customer Jun 18, 2022
Full star icon Full star icon Full star icon Full star icon Full star icon 5
The book can be rather dry and in my opinion should be used more as a supplementary reference guide when self-studying for cyber threat intelligence concepts as opposed to reading it cover-to-cover.What I like about the book is that it allowed me to get my brain juices flowing and as such gave me ideas and tools that I could apply in my day-to-day as a relatively novice CTI analyst.Overall, I highly recommend this book. It can be a great entry point into threat intelligence for cybersecurity professionals.
Amazon Verified review Amazon
Eddie W. Jun 27, 2022
Full star icon Full star icon Full star icon Full star icon Full star icon 5
This is a good deep dive into cyber threat intelligence including how to establish a program. The overview of the fundamentals of CTI along with some of the counter Intel measures can give a good start to designing a good cyber threat program.With a few tweaks and personalization and perhaps a little more of the tactical level advice. The book will be able to help the practicioners themselves align with a good strategy.
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an audiobook? Chevron down icon Chevron up icon

Where there is an audiobook version of a title available, you can buy it from the book details for that title. Your audiobook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalized audiobook download file.

Clicking the link will download the audiobook in a ZIP file. Unzip the ZIP file to your desired location to access the audiobook’s .mp3 files. You may play these .mp3 files on any supported player or device of your choice.

Please Note: Packt audiobooks are non-returnable and non-refundable.

Packt audiobook and Licensing: When you buy an audiobook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it, we have tried to balance the need for the audiobook to be usable for you the listener with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your audiobook for your own use onto any machine
  • You may not pass copies of the audiobook on to anyone else

How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, audiobook, eBook, or Bundle (Print+eBook) please follow the below steps:

  1. Register on our website using your email address and password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title.
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Card, or PayPal)

Where can I access support around an audiobook? Chevron down icon Chevron up icon

  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us

What are the benefits of audiobooks? Chevron down icon Chevron up icon

  • You can get the information you need immediately
  • You can easily take them with you on a laptop or mobile device
  • You can download them an unlimited number of times
  • There is no password protection
  • They save resources and space
  • You can multitask while listening to audiobooks
  • What is an audiobook? Chevron down icon Chevron up icon

    An audiobook, also known as a talking book, is a recorded version of a book where the content is read aloud.