Blue Team Handbook

Whether you are writing up your cases notes, analyzing potentially suspicious traffic, or called in to look over a misbehaving server - this book should help you handle the case and teach you some new techniques along the way.

Blue Team Handbook

Author: Don Murdoch

Publisher: CreateSpace

ISBN: 9781500734756

Page: 154

View: 663

Updated, Expanded, and released to print on 10/5/14! Complete details below! Two new sections, five protocol header illustrations, improved formatting, and other corrections. The Blue Team Handbook is a zero fluff reference guide for cyber security incident responders and InfoSec pros alike. The BTHb includes essential information in a condensed handbook format about the incident response process, how attackers work, common tools, a methodology for network analysis developed over 12 years, Windows and Linux analysis processes, tcpdump usage examples, Snort IDS usage, and numerous other topics. The book is peppered with practical real life techniques from the authors extensive career working in academia and a corporate setting. Whether you are writing up your cases notes, analyzing potentially suspicious traffic, or called in to look over a misbehaving server - this book should help you handle the case and teach you some new techniques along the way. Version 2.0 updates: - *** A new section on Database incident response was added. - *** A new section on Chain of Custody was added. - *** Matt Baxter's superbly formatted protocol headers were added! - Table headers bolded. - Table format slightly revised throughout book to improve left column readability. - Several sentences updated and expanded for readability and completeness. - A few spelling errors were corrected. - Several sites added to the Web References section. - Illustrations reformatted for better fit on the page. - An index was added. - Attribution for some content made more clear (footnotes, expanded source citing) - Content expanded a total of 20 pages

Related Books:

Blue Team Handbook
Language: en
Pages: 154
Authors: Don Murdoch
Categories: Computers
Type: BOOK - Published: 2014-08-03 - Publisher: CreateSpace

Updated, Expanded, and released to print on 10/5/14! Complete details below! Two new sections, five protocol header illustrations, improved formatting, and other corrections. The Blue Team Handbook is a zero fluff reference guide for cyber security incident responders and InfoSec pros alike. The BTHb includes essential information in a condensed
Blue Team Handbook: SOC, SIEM, and Threat Hunting (V1. 02)
Language: en
Pages: 258
Authors: Don Murdoch
Categories: Computers
Type: BOOK - Published: 2019-03-25 - Publisher:

Blue Team Handbook: SOC, SIEM, and Threat Hunting Use Cases is having an amazing impact on Security Operations worldwide. BTHb:SOCTH is the go to guiding book for new staff at a top 10 MSSP, integrated into University curriculum, and cited in top ten courses from a major information security training
Blue Team Field Manual
Language: en
Pages: 144
Authors: Alan White
Categories: Computers
Type: BOOK - Published: 2017-01-13 - Publisher: Createspace Independent Publishing Platform

Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting of the five core functions of Identify, Protect, Detect, Respond, and Recover by providing the tactical steps to follow and commands to use when preparing for, working through and recovering
Blue Team Handbook
Language: en
Pages: 254
Authors: Don Murdoch
Categories: Computers
Type: BOOK - Published: 2018-08-26 - Publisher: Createspace Independent Publishing Platform

Blue Team Handbook: SOC, SIEM, and Threat Hunting Use Cases provides the security practitioner with numerous field notes on building a security operations team and mining data sources to get the maximum amount of information out of them with a threat hunting approach. The author shares his fifteen years of
Cybersecurity Blue Team Toolkit
Language: en
Pages: 288
Authors: Nadean H. Tanner
Categories: Computers
Type: BOOK - Published: 2019-04-04 - Publisher: John Wiley & Sons

A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data breaches fill the headlines, it has become impossible for any business, large or small, to ignore the importance of cybersecurity. Most books on the subject, however, are either too specialized for the non-technical professional