Завантаження...
Електронні книги Bezpieczeństwo systemówДеталі електронної книги: Advanced Cyber Threat Intelligence and Hunting....
Деталі електронної книги
Увійти якщо вас цікавить зміст видання.
Advanced Cyber Threat Intelligence and Hunting. Detect APTs and zero-day attacks using CTI, behavioral analytics, and AI techniques
Gianluca Tiepolo, Dan Sorensen
Завантаження...
EЛЕКТРОННА КНИГА
Завантаження...
Modern adversaries rely on stealth, living-off-the-land techniques, and zero-day exploitation to evade traditional security controls. This practical guide shows experienced defenders how to move beyond reactive alerts and build a proactive threat hunting capability driven by cyber threat intelligence.
Written for seasoned cybersecurity professionals, the book demonstrates how to formulate CTI-driven hunt hypotheses and detect advanced persistent threats by analyzing adversary behavior across the Cyber Kill Chain. You’ll learn how to track APT infrastructure, map attacker TTPs using the MITRE ATT&CK framework, and identify post-exploitation activity that signals successful compromise.
Through hands-on exercises, you’ll apply behavioral analytics, detection engineering, and machine learning–based anomaly detection to uncover what signature-based tools miss. Coverage includes threat hunting in cloud, hybrid, and ICS/OT environments, with real-world techniques for lateral movement, persistence, privilege escalation, and data exfiltration.
By the end of this book, you’ll be equipped to run intelligence-led threat hunts, detect advanced threats earlier, and operationalize CTI as a core part of your defensive strategy.
Written for seasoned cybersecurity professionals, the book demonstrates how to formulate CTI-driven hunt hypotheses and detect advanced persistent threats by analyzing adversary behavior across the Cyber Kill Chain. You’ll learn how to track APT infrastructure, map attacker TTPs using the MITRE ATT&CK framework, and identify post-exploitation activity that signals successful compromise.
Through hands-on exercises, you’ll apply behavioral analytics, detection engineering, and machine learning–based anomaly detection to uncover what signature-based tools miss. Coverage includes threat hunting in cloud, hybrid, and ICS/OT environments, with real-world techniques for lateral movement, persistence, privilege escalation, and data exfiltration.
By the end of this book, you’ll be equipped to run intelligence-led threat hunts, detect advanced threats earlier, and operationalize CTI as a core part of your defensive strategy.
- 1. Revisiting CTI for Advanced Threat Hunting
- 2. Understanding APTs – Actors, Motivations, and TTPs
- 3. Deep Dive – CTI Collection and Enrichment for APTs
- 4. Core Principles of Proactive Threat Hunting
- 5. Understanding Data Sources for Threat Hunting
- 6. Hunting Zero-Days Through Behavioral Signatures
- 7. Advanced Hunting Techniques and Queries
- 8. Hunting Delivery and Initial Access
- 9. Hunting for Exploitation and Execution
- 10. Hunting for Persistence and Privilege Escalation
- 11. Hunting for Lateral Movement and Discovery
- 12. Hunting for Command and Control
- 13. Hunting for Collection, Exfiltration, and Impact
- 14. Attribution – Challenges and Techniques
- 15. Behavioral Clustering for Zero-Day Detection
- 16. Hunting in Cloud and Specialized Environments
- 17. Building a Resilient Threat Hunting Program
- 18. Emerging Trends in Threat Hunting and CTI
- Назва:Advanced Cyber Threat Intelligence and Hunting. Detect APTs and zero-day attacks using CTI, behavioral analytics, and AI techniques
- Автор:Gianluca Tiepolo, Dan Sorensen
- Оригінальна назва:Advanced Cyber Threat Intelligence and Hunting. Detect APTs and zero-day attacks using CTI, behavioral analytics, and AI techniques
- ISBN:9781806380381, 9781806380381
- Дата видання:2026-04-30
- Формат:Eлектронна книга
- Ідентифікатор видання: e_4swo
- Видавець: Packt Publishing
Завантаження...
Завантаження...