Buch, Englisch, 224 Seiten, Format (B × H): 178 mm x 254 mm
From Detection to Disruption
Buch, Englisch, 224 Seiten, Format (B × H): 178 mm x 254 mm
ISBN: 978-1-041-22089-3
Verlag: Taylor & Francis
Applied Cyber Threat Intelligence: From Detection to Disruption is a comprehensive guide for cybersecurity students, analysts, and professionals looking to gain practical, in-demand skills in today’s rapidly evolving digital threat landscape. This book bridges the gap between theoretical knowledge and operational expertise, providing readers with a hands-on approach to Cyber Threat Intelligence (CTI), threat hunting, malware analysis, and open-source investigations.
Covering the full CTI lifecycle from intelligence collection and analysis to adversary attribution and takedown, the book offers step-by-step walkthroughs of key tools such as Sysmon-Modular, DeTT&CT, OSSEM, and VirusTotal. Readers will learn how to conduct static and dynamic malware analysis, apply threat frameworks like MITRE ATT&CK and the Diamond Model to perform real-world investigations across surface, deep, and dark web environments.
Designed for both classroom use and professional upskilling, the book includes case studies, lab exercises, and instructor resources such as PowerPoint slides and code samples. Whether you're preparing for a cybersecurity role or enhancing your current capabilities, this book equips you with the analytical mindset, technical skills, and practical tools to proactively detect, understand, and respond to cyber threats with confidence and precision.
Zielgruppe
Professional Practice & Development, Professional Reference, and Professional Training
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Schadprogramme (Viren, Trojaner etc.)
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz
Weitere Infos & Material
Chapter 1: Introduction to Cyber Threat Intelligence (CTI). Chapter 2: Cyber Threat Landscape. Chapter 3: Threat Hunting - Static & Dynamic Analysis. Chapter 4: Operationalizing CTI. Chapter 5: Malware Analysis in Practice. Chapter 6: Mapping Adversary – CTI Frameworks. Chapter 7: Empowering Threat Detection through Analytics. Chapter 8: Conclusion.




