
Open-Source Security Operations Center (SOC)
A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Open-Source Security Operations Center (SOC)
A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC
About this book
A comprehensive and up-to-date exploration of implementing and managing a security operations center in an open-source environment
In Open-Source Security Operations Center (SOC): A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC, a team of veteran cybersecurity practitioners delivers a practical and hands-on discussion of how to set up and operate a security operations center (SOC) in a way that integrates and optimizes existing security procedures. You'll explore how to implement and manage every relevant aspect of cybersecurity, from foundational infrastructure to consumer access points.
In the book, the authors explain why industry standards have become necessary and how they have evolved – and will evolve – to support the growing cybersecurity demands in this space. Readers will also find:
- A modular design that facilitates use in a variety of classrooms and instructional settings
- Detailed discussions of SOC tools used for threat prevention and detection, including vulnerability assessment, behavioral monitoring, and asset discovery
- Hands-on exercises, case studies, and end-of-chapter questions to enable learning and retention
Perfect for cybersecurity practitioners and software engineers working in the industry, Open-Source Security Operations Center (SOC) will also prove invaluable to managers, executives, and directors who seek a better technical understanding of how to secure their networks and products.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Table of Contents
- Title Page
- Copyright
- Dedication from Alfred Basta
- Preface
- 1 Introduction to SOC Analysis
- 2 SOC Pillars
- 3 Security Incident Response
- 4 Log and Event Analysis
- 5 Network Traffic Analysis
- 6 Endpoint Analysis and Threat Hunting
- 7 Security Information and Event Management (SIEM)
- 8 Security Analytics and Machine Learning in SOC
- 9 Incident Response Automation and Orchestration
- 10 SOC Metrics and Performance Measurement
- 11 Compliance and Regulatory Considerations in SOC
- 12 Cloud Security and SOC Operations
- 13 Threat Intelligence and Advanced Threat Hunting
- 14 Emerging Trends and the Future of SOC Analysis
- 15 Cybersecurity Awareness and Training in SOC Operations
- Index
- End User License Agreement