This is an interim version of our Electronic Legal Deposit Catalogue-eJournals and eBooks while we continue to recover from a cyber-attack.
Effective Threat Investigation for SOC Analysts : The ultimate guide to examining various threats and attacker techniques using security logs /: The ultimate guide to examining various threats and attacker techniques using security logs. (2023)
Record Type:
Book
Title:
Effective Threat Investigation for SOC Analysts : The ultimate guide to examining various threats and attacker techniques using security logs /: The ultimate guide to examining various threats and attacker techniques using security logs. (2023)
Main Title:
Effective Threat Investigation for SOC Analysts : The ultimate guide to examining various threats and attacker techniques using security logs
Table of ContentsInvestigating Email ThreatsEmail Flow and Header AnalysisIntroduction to Windows Event LogsTracking Accounts Login and ManagementInvestigating Suspicious Process Execution Using Windows Event LogsInvestigating PowerShell Event LogsInvestigating Persistence and Lateral Movement Using Windows Event LogsNetwork Firewall Logs AnalysisInvestigating Cyber Threats by Using the Firewall LogsWeb Proxy Logs AnalysisInvestigating Suspicious Outbound Communications (C&C Communications) by Using Proxy LogsInvestigating External ThreatsInvestigating Network Flows and Security Solutions AlertsThreat Intelligence in a SOC Analyst’s DayMalware Sandboxing – Building a Malware Sandbox.
Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
Access Usage:
Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.