No detailed description available for "Mastering Cyber Intelligence".
Sprache
Verlagsort
Basel/Berlin/Boston
Großbritannien
Zielgruppe
Editions-Typ
Produkt-Hinweis
Dateigröße
ISBN-13
978-1-80020-828-5 (9781800208285)
Schweitzer Klassifikation
Dahj Jean Nestor M.:
Jean Nestor Dahj M. is a data scientist, cybersecurity researcher & analyst, and telecom professional with wide technical and scientific abilities. His skills have led him to data science, network probing, penetration testing & hacking, threat intelligence, and network analytics. He has built a wide range of skillsets through training and consultancy, including skills in cryptography, computer forensics, malware coding, and data products. Jean Nestor holds a master's degree (M-Tech) in Electrical Engineering from the University of South Africa. He is currently pursuing a PhD in the same field at the University of Johannesburg. His work history includes the likes of Huawei, Commprove technologies, Siftcon Forensic Services, Metro Teleworks, and Nanofritech Consulting. He is currently a full-stack data scientist at Rain Networks, part of a dynamic team developing data solutions. He currently lives in Pretoria and is originally from Kikwit, a small city in DR Congo
Table of Contents - Cyber Threat Intelligence Life Cycle
- Requirements and Intelligent Team Implementation
- Cyber Threat Intelligence Frameworks
- Cyber Threat Intelligence Tradecraft and Standards
- Goals Setting, procedures for CTI Strategy, and Practical Use Cases
- Cyber Threat Modeling and Adversary Analysis
- Threat Intelligence Data Sources
- Effective Defensive Tactics and Data Protection
- AI Application in Cyber Threat Analytics
- Threat Modeling and Analysis: - Practical Use Cases
- Usable Security: Threat Intelligence as part of the process
- SIEM Solutions and Intelligence-driven SOCs
- Threat Intelligence Metrics, Indicators of Compromise, and the Pyramid of Pain
- Threat Intelligence Reporting and Dissemination
- Threat Intelligence Sharing and Cyber Activity Attribution: Practical Use Cases