Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Cybersecurity: The Beginner's Guide
  • Table Of Contents Toc
  • Feedback & Rating feedback
Cybersecurity: The Beginner's Guide

Cybersecurity: The Beginner's Guide

By : Deepayan Chanda, Dr. Erdal Ozkaya
4.3 (12)
close
close
Cybersecurity: The Beginner's Guide

Cybersecurity: The Beginner's Guide

4.3 (12)
By: Deepayan Chanda, Dr. Erdal Ozkaya

Overview of this book

It's not a secret that there is a huge talent gap in the cybersecurity industry. Everyone is talking about it including the prestigious Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC Magazine, among many others. Additionally, Fortune CEO's like Satya Nadella, McAfee's CEO Chris Young, Cisco's CIO Colin Seward along with organizations like ISSA, research firms like Gartner too shine light on it from time to time. This book put together all the possible information with regards to cybersecurity, why you should choose it, the need for cyber security and how can you be part of it and fill the cybersecurity talent gap bit by bit. Starting with the essential understanding of security and its needs, we will move to security domain changes and how artificial intelligence and machine learning are helping to secure systems. Later, this book will walk you through all the skills and tools that everyone who wants to work as security personal need to be aware of. Then, this book will teach readers how to think like an attacker and explore some advanced security methodologies. Lastly, this book will deep dive into how to build practice labs, explore real-world use cases and get acquainted with various cybersecurity certifications. By the end of this book, readers will be well-versed with the security domain and will be capable of making the right choices in the cybersecurity field.
Table of Contents (14 chapters)
close
close

Security operations and continuous monitoring

Security monitoring is an integral process in cybersecurity. Security monitoring provides any organization with the ability to detect and analyze events from the enterprise network, applications, endpoints, and user activities. Typically, security operations and continuous monitoring (SOC) has three elements: people, process, and technology.

Technology helps drive the monitoring of assets, such as networks, applications, endpoints, servers, web applications, and generates alerts by automatic correlation and analysis:

A photo from a Microsoft SOC

The people component in SOC focuses on validating these alerts manually and categorizing them.

The process component is all about analyzing the alerts/logs and either identifies a threat and provides detailed information to the remediation team or marks it as false positive:

SOC also has...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech

Create a Note

Modal Close icon
You need to login to use this feature.
notes
bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Delete Note

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Edit Note

Modal Close icon
Write a note (max 255 characters)
Cancel
Update Note

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY