Security Operations Center - Analyst Guide

SIEM Technology, Use Cases and Practices

Nonfiction, Computers, Advanced Computing, Information Technology
Cover of the book Security Operations Center - Analyst Guide by Arun Thomas, Arun E Thomas
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Arun Thomas ISBN: 9781641365123
Publisher: Arun E Thomas Publication: September 27, 2017
Imprint: Arun E Thomas Language: English
Author: Arun Thomas
ISBN: 9781641365123
Publisher: Arun E Thomas
Publication: September 27, 2017
Imprint: Arun E Thomas
Language: English

Security analytics can be defined as the process of continuously monitoring and analyzing all the activities in your enterprise network to ensure the minimal number of occurrences of security breaches. Security Analyst is the individual that is qualified to perform the functions necessary to accomplish the security monitoring goals of the organization. This book is intended to improve the ability of a security analyst to perform their day to day work functions in a more professional manner. Deeper knowledge of tools, processes and technology is needed for this. 
A firm understanding of all the domains of this book is going to be vital in achieving the desired skill set to become a professional security analyst. The attempt of this book is to address the problems associated with the content development (use cases and correlation rules) of SIEM deployments

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Security analytics can be defined as the process of continuously monitoring and analyzing all the activities in your enterprise network to ensure the minimal number of occurrences of security breaches. Security Analyst is the individual that is qualified to perform the functions necessary to accomplish the security monitoring goals of the organization. This book is intended to improve the ability of a security analyst to perform their day to day work functions in a more professional manner. Deeper knowledge of tools, processes and technology is needed for this. 
A firm understanding of all the domains of this book is going to be vital in achieving the desired skill set to become a professional security analyst. The attempt of this book is to address the problems associated with the content development (use cases and correlation rules) of SIEM deployments

More books from Information Technology

Cover of the book Tablet: trasformazioni cognitive e socio-culturali by Arun Thomas
Cover of the book Advances in Geocomputation by Arun Thomas
Cover of the book On the Nature of Effective CIO/CEO Communication by Arun Thomas
Cover of the book Ergonomic Design of Products and Worksystems - 21st Century Perspectives of Asia by Arun Thomas
Cover of the book Joomla! 1.5x Customization: Make Your Site Adapt to Your Needs by Arun Thomas
Cover of the book Elements of Information Theory by Arun Thomas
Cover of the book Apache Roller 4.0  Beginner's Guide by Arun Thomas
Cover of the book Business Process Management by Arun Thomas
Cover of the book Advanced Information Systems Engineering Workshops by Arun Thomas
Cover of the book Business Intelligence and Performance Management by Arun Thomas
Cover of the book Die Cyber-Kriminellen in Wien by Arun Thomas
Cover of the book IEEE 802.15.4 and ZigBee as Enabling Technologies for Low-Power Wireless Systems with Quality-of-Service Constraints by Arun Thomas
Cover of the book Selenium 1.0 Testing Tools: Beginners Guide by Arun Thomas
Cover of the book Understanding and Using Rough Set Based Feature Selection: Concepts, Techniques and Applications by Arun Thomas
Cover of the book High Availability MySQL Cookbook by Arun Thomas
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy