14%
Modern Security Operations Center, The

Modern Security Operations Center, The

          
5
4
3
2
1

International Edition


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

The Industry Standard, Vendor-Neutral Guide to Managing SOCs and Delivering SOC Services This completely new, vendor-neutral guide brings together all the knowledge you need to build, maintain, and operate a modern Security Operations Center (SOC) and deliver security services as efficiently and cost-effectively as possible. Leading security architect Joseph Muniz helps you assess current capabilities, align your SOC to your business, and plan a new SOC or evolve an existing one. He covers people, process, and technology; explores each key service handled by mature SOCs; and offers expert guidance for managing risk, vulnerabilities, and compliance. Throughout, hands-on examples show how advanced red and blue teams execute and defend against real-world exploits using tools like Kali Linux and Ansible. Muniz concludes by previewing the future of SOCs, including Secure Access Service Edge (SASE) cloud technologies and increasingly sophisticated automation. This guide will be indispensable for everyone responsible for delivering security services—managers and cybersecurity professionals alike. Address core business and operational requirements, including sponsorship, management, policies, procedures, workspaces, staffing, and technology Identify, recruit, interview, onboard, and grow an outstanding SOC team Thoughtfully decide what to outsource and what to insource Collect, centralize, and use both internal data and external threat intelligence Quickly and efficiently hunt threats, respond to incidents, and investigate artifacts Reduce future risk by improving incident recovery and vulnerability management Apply orchestration and automation effectively, without just throwing money at them Position yourself today for emerging SOC technologies

Table of Contents:
Preface Chapter 1: Introducing Security Operations and the SOC Introducing the SOC Factors Leading to a Dysfunctional SOC Cyberthreats Investing in Security The Impact of a Breach Establishing a Baseline The Impact of Change Fundamental Security Capabilities Signature Detection Behavior Detection Anomaly Detection Best of Breed vs. Defense in Depth Standards, Guidelines, and Frameworks NIST Cybersecurity Framework ISO 3100:2018 FIRST Service Frameworks Applying Frameworks Industry Threat Models The Cyber Kill Chain Model The Diamond Model MITRE ATT&CK Model Choosing a Threat Model Vulnerabilities and Risk Endless Vulnerabilities Business Challenges In-House vs. Outsourcing Services Advantages Services Disadvantages Hybrid Services SOC Services SOC Maturity Models SOC Maturity Assessment SOC Program Maturity SOC Goals Assessment Defining Goals SOC Goals Ranking Threats Ranking SOC Goals Assessment Summarized SOC Capabilities Assessment Capability Maps SOC Capabilities Gaps Analysis Capability Map Next Steps SOC Development Milestones Summary References Chapter 2: Developing a Security Operations Center Mission Statement and Scope Statement Developing Mission and Scope Statements SOC Scope Statement Developing a SOC SOC Procedures Designing Procedures Security Tools Evaluating Vulnerabilities Preventive Technologies Detection Technologies Mobile Device Security Concerns Planning a SOC Capacity Planning Developing a Capacity Plan Designing a SOC Facility Physical SOC vs. Virtual SOC SOC Location SOC Interior SOC Rooms SOC Computer Rooms SOC Layouts Network Considerations Segmentation Logical Segmentation Choosing Segmentation Client/Server Segmentation Active Directory Segmentation Throughput Connectivity and Redundancy Disaster Recovery Security Considerations Policy and Compliance Network Access Control Encryption Internal Security Tools Intrusion Detection and Prevention Network Flow and Capturing Packets Change Management Host Systems Guidelines and Recommendations for Securing Your SOC Network Tool Collaboration SOC Tools Reporting and Dashboards Throughput and Storage Centralized Data Management Summary References Chapter 3: SOC Services Fundamental SOC Services SOC Challenges The Three Pillars of Foundational SOC Support Services Pillar 1: Work Environment Pillar 2: People Pillar 3: Technology Evaluating the Three Pillars of Foundational SOC Support Services SOC Service Areas FIRST’s CSIRT Developing SOC Service Areas In-House Services vs. External Services Contracted vs. Employee Job Roles SOC Service Job Goals Resource Planning Service Maturity: If You Build It, They Will Come SOC Service 1: Risk Management Four Responses to Risk Reducing Risk Addressing Risk SOC Service 2: Vulnerability Management Vulnerability Management Best Practice Vulnerability Scanning Tools Penetration Testing SOC Service 3: Compliance Meeting Compliance with Audits SOC Service 4: Incident Management NIST Special Publication 800-61 Revision 2 Incident Response Planning Incident Impact Playbooks SOC Service 5: Analysis Static Analysis Dynamic Analysis SOC Service 6: Digital Forensics SOC Service 7: Situational and Security Awareness User Training SOC Service 8: Research and Development Summary References Chapter 4: People and Process Career vs. Job Developing Job Roles General Schedule Pay Scale IT Industry Job Roles Common IT Job Roles SOC Job Roles Security Analyst Penetration Tester Assessment Officer Incident Responder Systems Analyst Security Administrator Security Engineer Security Trainer Security Architect Cryptographer/Cryptologist Forensic Engineer Chief Information Security Officer NICE Cybersecurity Workforce Framework Nice Framework Components Role Tiers SOC Services and Associated Job Roles Risk Management Service Vulnerability Management Service Incident Management Service Analysis Service Compliance Service Digital Forensics Service Situational and Security Awareness Service Research and Development Service Soft Skills Evaluating Soft Skills SOC Soft Skills Security Clearance Requirements Pre-Interviewing Interviewing Interview Prompter Post Interview Onboarding Employees Onboarding Requirements Managing People Job Retention Training Training Methods Certifications Company Culture Summary References Chapter 5: Centralizing Data Data in the SOC Strategic and Tactical Data Data Structure Data Types Data Context Data-Focused Assessment Data Assessment Example: Antivirus Threat Mapping Data Applying Data Assessments to SOC Services Logs Log Types Log Formats Security Information and Event Management SIEM Data Processing Data Correlation Data Enrichment SIEM Solution Planning SIEM Tuning Troubleshooting SIEM Logging SIEM Troubleshooting Part 1: Data Input SIEM Troubleshooting Part 2: Data Processing and Validation SIEM Troubleshooting Examples Additional SIEM Features APIs Leveraging APIs API Architectures API Examples Big Data Hadoop Big Data Threat Feeds Machine Learning Machine Learning in Cybersecurity Artificial Intelligence Machine Learning Models Summary References Chapter 6: Reducing Risk and Exceeding Compliance Why Exceeding Compliance Policies Policy Overview Policy Purpose Policy Scope Policy Statement Policy Compliance Related Standards, Policies, Guidelines, and Processes Definitions and Terms History Launching a New Policy Steps for Launching a New Policy Policy Enforcement Certification and Accreditation Procedures Procedure Document Tabletop Exercise Tabletop Exercise Options Tabletop Exercise Execution Tabletop Exercise Format Tabletop Exercise Template Example Standards, Guidelines, and Frameworks NIST Cybersecurity Framework ISO/IEC 27005 CIS Controls ISACA COBIT 2019 FIRST CSIRT Services Framework Exceeding Compliance Audits Audit Example Internal Audits External Auditors Audit Tools Assessments Assessment Types Assessment Results Assessment Template Vulnerability Scanners Assessment Program Weaknesses Penetration Test NIST Special Publication 800-115 Additional NIST SP 800-115 Guidance Penetration Testing Types Penetration Testing Planning Industry Compliance Compliance Requirements Summary References Chapter 7: Threat Intelligence Threat Intelligence Overview Threat Data Threat Intelligence Categories Strategic Threat Intelligence Tactical Threat Intelligence Operational Threat Intelligence Technical Threat Intelligence Threat Intelligence Context Threat Context Evaluating Threat Intelligence Threat Intelligence Checklist Content Quality Testing Threat Intelligence Planning a Threat Intelligence Project Data Expectations for Strategic Threat Intelligence Data Expectations for Tactical Threat Intelligence Data Expectations for Operational Threat Intelligence Data Expectations for Technical Threat Intelligence Collecting and Processing Intelligence Processing Nontechnical Data Operational Data and Web Processing Technical Processing Technical Threat Intelligence Resources Actionable Intelligence Security Tools and Threat Intelligence Feedback Summary References Chapter 8: Threat Hunting and Incident Response Security Incidents Incident Response Lifecycle Phase 1: Preparation Assigning Tasks with Playbooks Communication Third-Party Interaction Law Enforcement Law Enforcement Risk Ticketing Systems Other Incident Response Planning Templates Phase 1: Preparation Summary Phase 2: Detection and Analysis Incident Detection Core Security Capabilities Threat Analysis Detecting Malware Behavior Infected Systems Analyzing Artifacts Identifying Artifact Types Packing Files Basic Static Analysis Advanced Static Analysis Dynamic Analysis Phase 2: Detection and Analysis Summary Phase 3: Containment, Eradication, and Recovery Containment Responding to Malware Threat Hunting Techniques Eradicate Recovery Digital Forensics Digital Forensic Process First Responder Chain of Custody Working with Evidence Duplicating Evidence Hashes Forensic Static Analysis Recovering Data Forensic Dynamic Analysis Digital Forensics Summary Phase 3: Containment, Eradication, and Recovery Summary Phase 4: Post-Incident Activity Post-Incident Response Process Phase 4: Post-Incident Response Summary Incident Response Guidelines FIRST Services Frameworks Summary References Chapter 9: Vulnerability Management Vulnerability Management Phase 1: Asset Inventory Phase 2: Information Management Phase 3: Risk Assessment Phase 4: Vulnerability Assessment Phase 5: Report and Remediate Phase 6: Respond and Repeat Measuring Vulnerabilities Common Vulnerabilities and Exposures Common Vulnerability Scoring System CVSS Standards Vulnerability Technology Vulnerability Scanners Currency and Coverage Tuning Vulnerability Scanners Exploitation Tools Asset Management and Compliance Tools Network Scanners and Network Access Control Threat Detection Tools Vulnerability Management Service Scanning Services Vulnerability Management Service Roles Vulnerability Evaluation Procedures Vulnerability Response Vulnerability Accuracy Responding to Vulnerabilities Cyber Insurance Patching Systems Residual Risk Remediation Approval Reporting Exceptions Vulnerability Management Process Summarized Summary References Chapter 10: Data Orchestration Introduction to Data Orchestration Comparing SIEM and SOAR The Rise of XDR Security Orchestration, Automation, and Response SOAR Example: Phantom Endpoint Detection and Response EDR Example: CrowdStrike Playbooks Playbook Components Constructing Playbooks Incident Response Consortium Playbook Examples: Malware Outbreak Automation Automating Playbooks Common Targets for Automation Automation Pitfalls Playbook Workflow DevOps Programming Data Management Text-File Formats Common Data Formats Data Modeling DevOps Tools DevOps Targets Manual DevOps Automated DevOps DevOps Lab Using Ansible Ansible Playbooks Blueprinting with Osquery Running Osquery Network Programmability Learning NetDevOps APIs NetDevOps Example Cloud Programmability Orchestration in the Cloud Amazon DevOps SaaS DevOps Summary References Chapter 11: Future of the SOC All Eyes on SD-WAN and SASE VoIP Adoption As Prologue to SD-WAN Adoption Introduction of SD-WAN Challenges with the Traditional WAN SD-WAN to the Rescue SASE Solves SD-WAN Problems SASE Defined Future of SASE IT Services Provided by the SOC IT Operations Defined Hacking IT Services IT Services Evolving Future of IT Services Future of Training Training Challenges Training Today Case Study: Training I Use Today Free Training Gamifying Learning On-Demand and Personalized Learning Future of Training Full Automation with Machine Learning Machine Learning Machine Learning Hurdles Machine Learning Applied Training Machine Learning Future of Machine Learning Future of Your SOC: Bringing It All Together Your Future Facilities and Capabilities Group Tags Your Future SOC Staff Audits, Assessments, and Penetration Testing Future Impact to Your Services Hunting for Tomorrow’s Threats Summary References 9780135619858 TOC 3/24/2021


Best Sellers


Product Details
  • ISBN-13: 9780135619858
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Addison Wesley
  • Height: 232 mm
  • No of Pages: 752
  • Spine Width: 42 mm
  • Width: 179 mm
  • ISBN-10: 0135619858
  • Publisher Date: 27 Jul 2021
  • Binding: Paperback
  • Language: English
  • Returnable: Y
  • Weight: 1310 gr


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Modern Security Operations Center, The
Pearson Education (US) -
Modern Security Operations Center, The
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Modern Security Operations Center, The

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA