SØG - mellem flere end 8 millioner bøger:

Søg på: Titel, forfatter, forlag - gerne i kombination.
Eller blot på isbn, hvis du kender dette.

Viser: Security Operations Center - Building, Operating, and Maintaining Your SOC

Security Operations Center, 1. udgave

Security Operations Center Vital Source e-bog

Joseph Muniz
(2015)
Pearson International
195,00 kr. 175,50 kr.
Leveres umiddelbart efter køb
Security Operations Center, 1. udgave

Security Operations Center Vital Source e-bog

Joseph Muniz
(2015)
Pearson International
192,00 kr. 172,80 kr.
Leveres umiddelbart efter køb
Security Operations Center, 1. udgave

Security Operations Center Vital Source e-bog

Joseph Muniz
(2015)
Pearson International
163,00 kr. 146,70 kr.
Leveres umiddelbart efter køb
Security Operations Center - Building, Operating, and Maintaining Your SOC

Security Operations Center

Building, Operating, and Maintaining Your SOC
Joseph Muniz, Gary McIntyre og Nadhem AlFardan
(2015)
Sprog: Engelsk
Cisco Press
574,00 kr. 516,60 kr.
ikke på lager, Bestil nu og få den leveret
om ca. 10 hverdage

Detaljer om varen

  • 1. Udgave
  • Vital Source 90 day rentals (dynamic pages)
  • Udgiver: Pearson International (November 2015)
  • ISBN: 9780134052038R90
Security Operations Center Building, Operating, and Maintaining Your SOC   The complete, practical guide to planning, building, and operating an effective Security Operations Center (SOC) Security Operations Center is the complete guide to building, operating, and managing Security Operations Centers in any environment. Drawing on experience with hundreds of customers ranging from Fortune 500 enterprises to large military organizations, three leading experts thoroughly review each SOC model, including virtual SOCs. You’ll learn how to select the right strategic option for your organization, and then plan and execute the strategy you’ve chosen. Security Operations Center walks you through every phase required to establish and run an effective SOC, including all significant people, process, and technology capabilities. The authors assess SOC technologies, strategy, infrastructure, governance, planning, implementation, and more. They take a holistic approach considering various commercial and open-source tools found in modern SOCs. This best-practice guide is written for anybody interested in learning how to develop, manage, or improve a SOC. A background in network security, management, and operations will be helpful but is not required. It is also an indispensable resource for anyone preparing for the Cisco SCYBER exam.   ·         Review high-level issues, such as vulnerability and risk management, threat intelligence, digital investigation, and data collection/analysis ·         Understand the technical components of a modern SOC ·         Assess the current state of your SOC and identify areas of improvement ·         Plan SOC strategy, mission, functions, and services ·         Design and build out SOC infrastructure, from facilities and networks to systems, storage, and physical security ·         Collect and successfully analyze security data ·         Establish an effective vulnerability management practice ·         Organize incident response teams and measure their performance ·         Define an optimal governance and staffing model ·         Develop a practical SOC handbook that people can actually use ·         Prepare SOC to go live, with comprehensive transition plans ·         React quickly and collaboratively to security incidents ·         Implement best practice security operations, including continuous enhancement and improvement   
Licens varighed:
Bookshelf online: 90 dage fra købsdato.
Bookshelf appen: 90 dage fra købsdato.

Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 2 sider kan printes ad gangen
Copy: højest 2 sider i alt kan kopieres (copy/paste)

Detaljer om varen

  • 1. Udgave
  • Vital Source 365 day rentals (dynamic pages)
  • Udgiver: Pearson International (November 2015)
  • ISBN: 9780134052038R365
Security Operations Center Building, Operating, and Maintaining Your SOC   The complete, practical guide to planning, building, and operating an effective Security Operations Center (SOC) Security Operations Center is the complete guide to building, operating, and managing Security Operations Centers in any environment. Drawing on experience with hundreds of customers ranging from Fortune 500 enterprises to large military organizations, three leading experts thoroughly review each SOC model, including virtual SOCs. You’ll learn how to select the right strategic option for your organization, and then plan and execute the strategy you’ve chosen. Security Operations Center walks you through every phase required to establish and run an effective SOC, including all significant people, process, and technology capabilities. The authors assess SOC technologies, strategy, infrastructure, governance, planning, implementation, and more. They take a holistic approach considering various commercial and open-source tools found in modern SOCs. This best-practice guide is written for anybody interested in learning how to develop, manage, or improve a SOC. A background in network security, management, and operations will be helpful but is not required. It is also an indispensable resource for anyone preparing for the Cisco SCYBER exam.   ·         Review high-level issues, such as vulnerability and risk management, threat intelligence, digital investigation, and data collection/analysis ·         Understand the technical components of a modern SOC ·         Assess the current state of your SOC and identify areas of improvement ·         Plan SOC strategy, mission, functions, and services ·         Design and build out SOC infrastructure, from facilities and networks to systems, storage, and physical security ·         Collect and successfully analyze security data ·         Establish an effective vulnerability management practice ·         Organize incident response teams and measure their performance ·         Define an optimal governance and staffing model ·         Develop a practical SOC handbook that people can actually use ·         Prepare SOC to go live, with comprehensive transition plans ·         React quickly and collaboratively to security incidents ·         Implement best practice security operations, including continuous enhancement and improvement   
Licens varighed:
Bookshelf online: 5 år fra købsdato.
Bookshelf appen: 5 år fra købsdato.

Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 2 sider kan printes ad gangen
Copy: højest 2 sider i alt kan kopieres (copy/paste)

Detaljer om varen

  • 1. Udgave
  • Vital Source 180 day rentals (dynamic pages)
  • Udgiver: Pearson International (November 2015)
  • ISBN: 9780134052038R180
Security Operations Center Building, Operating, and Maintaining Your SOC   The complete, practical guide to planning, building, and operating an effective Security Operations Center (SOC) Security Operations Center is the complete guide to building, operating, and managing Security Operations Centers in any environment. Drawing on experience with hundreds of customers ranging from Fortune 500 enterprises to large military organizations, three leading experts thoroughly review each SOC model, including virtual SOCs. You’ll learn how to select the right strategic option for your organization, and then plan and execute the strategy you’ve chosen. Security Operations Center walks you through every phase required to establish and run an effective SOC, including all significant people, process, and technology capabilities. The authors assess SOC technologies, strategy, infrastructure, governance, planning, implementation, and more. They take a holistic approach considering various commercial and open-source tools found in modern SOCs. This best-practice guide is written for anybody interested in learning how to develop, manage, or improve a SOC. A background in network security, management, and operations will be helpful but is not required. It is also an indispensable resource for anyone preparing for the Cisco SCYBER exam.   ·         Review high-level issues, such as vulnerability and risk management, threat intelligence, digital investigation, and data collection/analysis ·         Understand the technical components of a modern SOC ·         Assess the current state of your SOC and identify areas of improvement ·         Plan SOC strategy, mission, functions, and services ·         Design and build out SOC infrastructure, from facilities and networks to systems, storage, and physical security ·         Collect and successfully analyze security data ·         Establish an effective vulnerability management practice ·         Organize incident response teams and measure their performance ·         Define an optimal governance and staffing model ·         Develop a practical SOC handbook that people can actually use ·         Prepare SOC to go live, with comprehensive transition plans ·         React quickly and collaboratively to security incidents ·         Implement best practice security operations, including continuous enhancement and improvement   
Licens varighed:
Bookshelf online: 180 dage fra købsdato.
Bookshelf appen: 180 dage fra købsdato.

Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 2 sider kan printes ad gangen
Copy: højest 2 sider i alt kan kopieres (copy/paste)

Detaljer om varen

  • Paperback: 448 sider
  • Udgiver: Cisco Press (Oktober 2015)
  • Forfattere: Joseph Muniz, Gary McIntyre og Nadhem AlFardan
  • ISBN: 9780134052014

Security Operations Center

Building, Operating, and Maintaining Your SOC

 

The complete, practical guide to planning, building, and operating an effective Security Operations Center (SOC)


Security Operations Center is the complete guide to building, operating, and managing Security Operations Centers in any environment. Drawing on experience with hundreds of customers ranging from Fortune 500 enterprises to large military organizations, three leading experts thoroughly review each SOC model, including virtual SOCs. You'll learn how to select the right strategic option for your organization, and then plan and execute the strategy you've chosen.


Security Operations Center walks you through every phase required to establish and run an effective SOC, including all significant people, process, and technology capabilities. The authors assess SOC technologies, strategy, infrastructure, governance, planning, implementation, and more. They take a holistic approach considering various commercial and open-source tools found in modern SOCs.


This best-practice guide is written for anybody interested in learning how to develop, manage, or improve a SOC. A background in network security, management, and operations will be helpful but is not required. It is also an indispensable resource for anyone preparing for the Cisco SCYBER exam.

 

·         Review high-level issues, such as vulnerability and risk management, threat intelligence, digital investigation, and data collection/analysis

·         Understand the technical components of a modern SOC

·         Assess the current state of your SOC and identify areas of improvement

·         Plan SOC strategy, mission, functions, and services

·         Design and build out SOC infrastructure, from facilities and networks to systems, storage, and physical security

·         Collect and successfully analyze security data

·         Establish an effective vulnerability management practice

·         Organize incident response teams and measure their performance

·         Define an optimal governance and staffing model

·         Develop a practical SOC handbook that people can actually use

·         Prepare SOC to go live, with comprehensive transition plans

·         React quickly and collaboratively to security incidents

·         Implement best practice security operations, including continuous enhancement and improvement

  

Introduction xx
Part I SOC Basics
Chapter 1 Introduction to Security Operations and the SOC 1 Cybersecurity Challenges 1 Threat Landscape 4 Business Challenges 7 The Cloud 8 Compliance 9 Privacy and Data Protection 9 Introduction to Information Assurance 10 Introduction to Risk Management 11 Information Security Incident Response 14 Incident Detection 15 Incident Triage 16 Incident Categories 17 Incident Severity 17 Incident Resolution 18 Incident Closure 19 Post-Incident 20 SOC Generations 21 First-Generation SOC 22 Second-Generation SOC 22 Third-Generation SOC 23 Fourth-Generation SOC 24 Characteristics of an Effective SOC 24 Introduction to Maturity Models 27 Applying Maturity Models to SOC 29 Phases of Building a SOC 31 Challenges and Obstacles 32 Summary 32 References 33
Chapter 2 Overview of SOC Technologies 35 Data Collection and Analysis 35 Data Sources 37 Data Collection 38 The Syslog Protocol 39 Telemetry Data: Network Flows 45 Telemetry Data: Packet Capture 48 Parsing and Normalization 49 Security Analysis 52 Alternatives to Rule-Based Correlation 55 Data Enrichment 56 Big Data Platforms for Security 57 Vulnerability Management 58 Vulnerability Announcements 60 Threat Intelligence 62 Compliance 64 Ticketing and Case Management 64 Collaboration 65 SOC Conceptual Architecture 66 Summary 67 References 67
Part II: The Plan Phase
Chapter 3 Assessing Security Operations Capabilities 69 Assessment Methodology 69 Step
1: Identify Business and IT Goals 71 Step
2: Assessing Capabilities 73 Assessing IT Processes 75 Step
3: Collect Information 82 Step
4: Analyze Maturity Levels 84 Step
5: Formalize Findings 87 The Organization''s Vision and Strategy 87 The Department''s Vision and Strategy 87 External and Internal Compliance Requirements 87 Organization''s Threat Landscape 88 History of Previous Information Security Incidents 88 SOC Sponsorship 89 Allocated Budget 89 Presenting Data 89 Closing 90 Summary 90 References 90
Chapter 4 SOC Strategy 91 Strategy Elements 91 Who Is Involved? 92 SOC Mission 92 SOC Scope 93 Example
1: A Military Organization 94 Mission Statement 94 SOC Scope Statement 95 Example
2: A Financial Organization 95 Mission Statement 95 SOC Scope Statement 95 SOC Model of Operation 95 In-House and Virtual SOC 96 SOC Services 98 SOC Capabilities Roadmap 99 Summary 101
Part III: The Design Phase
Chapter 5 The SOC Infrastructure 103 Design Considerations 103 Model of Operation 104 Facilities 105 SOC Internal Layout 106 Lighting 107 Acoustics 107 Physical Security 108 Video Wall 108 SOC Analyst Services 109 Active Infrastructure 110 Network 111 Access to Systems 112 Security 112 Compute 115 Dedicated Versus Virtualized Environment 116 Choice of Operating Systems 118 Storage 118 Capacity Planning 119 Collaboration 119 Ticketing 120 Summary 120 References 120
Chapter 6 Security Event Generation and Collection 123 Data Collection 123 Calculating EPS 124 Ubuntu Syslog Server 124 Network Time Protocol 129 Deploying NTP 130 Data-Collection Tools 134 Company 135 Product Options and Architecture 136 Installation and Maintenance 136 User Interface and Experience 136 Compliance Requirements 137 Firewalls 137 Stateless/Stateful Firewalls 137 Cisco Adaptive Security Appliance ASA 138 Application Firewalls 142 Cisco FirePOWER Services 142 Cloud Security 152 Cisco Meraki 153 Exporting Logs from Meraki 154 Virtual Firewalls 155 Cisco Virtual Firewalls 156 Host Firewalls 157 Intrusion Detection and Prevention Systems 157

De oplyste priser er inkl. moms

Andre har også købt:

Data-Driven Security - Analysis, Visualization and Dashboards
Data-Driven Security
Af Jay Jacobs og Bo...
Pris: 393,00 kr.
Crafting the InfoSec Playbook - Security Monitoring and Incident Response Master Plan
Crafting the InfoSec ...
Af Jeff Bollinger, ...
Pris: 445,00 kr.

Polyteknisk Boghandel

har gennem mere end 50 år været studieboghandlen på DTU og en af Danmarks førende specialister i faglitteratur.

 

Vi lagerfører et bredt udvalg af bøger, ikke bare inden for videnskab og teknik, men også f.eks. ledelse, IT og meget andet.

Læs mere her


Trykt eller digital bog?

Ud over trykte bøger tilbyder vi tre forskellige typer af digitale bøger:

 

Vital Source Bookshelf: En velfungerende ebogsplatform, hvor bogen downloades til din computer og/eller mobile enhed.

 

Du skal bruge den gratis Bookshelf software til at læse læse bøgerne - der er indbygget gode værktøjer til f.eks. søgning, overstregning, notetagning mv. I langt de fleste tilfælde vil du samtidig have en sideløbende 1825 dages online adgang. Læs mere om Vital Source bøger

 

Levering: I forbindelse med købet opretter du et login. Når du har installeret Bookshelf softwaren, logger du blot ind og din bog downloades automatisk.

 

 

Adobe ebog: Dette er Adobe DRM ebøger som downloades til din lokale computer eller mobil enhed.

 

For at læse bøgerne kræves særlig software, som understøtter denne type. Softwaren er gratis, men du bør sikre at du har rettigheder til installere software på den maskine du påtænker at anvende den på. Læs mere om Adobe DRM bøger

 

Levering: Et download link sendes pr email umiddelbart efter købet.

 


Ibog: Dette er en online bog som kan læses på udgiverens website. 

Der kræves ikke særlig software, bogen læses i en almindelig browser.

 

Levering: Vores medarbejder sender dig en adgangsnøgle pr email.

 

Vi gør opmærksom på at der ikke er retur/fortrydelsesret på digitale varer.