Main
Effective Threat Investigation for SOC Analysts
Effective Threat Investigation for SOC Analysts
Mostafa Yahia
5.0
/
5.0
0 comments
The ultimate guide to examining various threats and attacker techniques using security logs Detect and investigate various cyber threats and techniques carried out by malicious actors by analyzing logs generated from different sources Key Features• Understand and analyze various modern cyber threats and attackers' techniques• Gain in-depth knowledge of email security, Windows, firewall, proxy, WAF, and security solution logs• Explore popular cyber threat intelligence platforms to investigate suspicious artifacts.
Comments of this book
There are no comments yet.