Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Incident Response for Windows
  • Table Of Contents Toc
  • Feedback & Rating feedback
Incident Response for Windows

Incident Response for Windows

By : Tykushin, Ostrovskaya
4.8 (9)
close
close
Incident Response for Windows

Incident Response for Windows

4.8 (9)
By: Tykushin, Ostrovskaya

Overview of this book

Cybersecurity incidents are becoming increasingly common and costly, making incident response a critical domain for organizations to understand and implement. This book enables you to effectively detect, respond to, and prevent cyberattacks on Windows-based systems by equipping you with the knowledge and tools needed to safeguard your organization's critical assets, in line with the current threat landscape. The book begins by introducing you to modern sophisticated cyberattacks, including threat actors, methods, and motivations. Then, the phases of efficient incident response are linked to the attack's life cycle using a unified cyber kill chain. As you advance, you'll explore various types of Windows-based platform endpoint forensic evidence and the arsenal necessary to gain full visibility of the Windows infrastructure. The concluding chapters discuss the best practices in the threat hunting process, along with proactive approaches that you can take to discover cybersecurity incidents before they reach their final stage. By the end of this book, you’ll have gained the skills necessary to run intelligence-driven incident response in a Windows environment, establishing a full-fledged incident response and management process, as well as proactive methodologies to enhance the cybersecurity posture of an enterprise environment.
Table of Contents (20 chapters)
close
close
1
Part 1: Understanding the Threat Landscape and Attack Life Cycle
4
Part 2: Incident Response Procedures and Endpoint Forensic Evidence Collection
7
Part 3: Incident Analysis and Threat Hunting on Windows Systems
chevron up
15
Part 4: Incident Investigation Management and Reporting

Part 3: Incident Analysis and Threat Hunting on Windows Systems

This part provides a detailed exploration of the entire attack life cycle and the corresponding incident response steps in a Windows environment. It begins with an examination of the initial access techniques employed by attackers, including the methods used to breach perimeters and establish a foothold, as well as the investigation methods and forensic artifacts involved in identifying these breaches. We then discuss how attackers explore and map the Windows environment after gaining initial access, identifying active hosts and key assets, and how to detect and respond to these discovery activities. Furthermore, this section delves into the topic of network propagation, describing the methods employed by attackers to move laterally across the network, maintain persistence, and prepare for data exfiltration. It outlines the techniques used to gather sensitive data, such as personally identifiable information, financial...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech

Create a Note

Modal Close icon
You need to login to use this feature.
notes
bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY