This book is designed to provide information about building and running a security operations center. (SOC). Every effort has been made to make this book as. Security Operations Center: Building, Operating, and Maintaining your SOC -- Access Code. Joseph Muniz. Gary McIntyre. Nadhem AlFardan. © | Cisco. Find great deals for Security Operation Center: Building, Operating and Maintaining Your SOC by Joey Muniz, Gary McIntyre and Nadhem AlFardan ( Compre Security Operations Center: Building, Operating, and Maintaining your SOC (English Edition) de Joseph Muniz, Gary McIntyre, Nadhem AlFardan na.
Related videosSecurity Operation Center - Video: Inside Akamai’s SOC
Add To My Wish List. Register your product to gain access to bonus material or receive a coupon. This eBook includes the following formats, accessible from your Account page after purchase:. EPUB The open industry format known for its reflowable content and usability on supported mobile devices.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours. How to organize IT security for an era of unprecedented, fast-changing, and increasingly complex threats Thoroughly introduces SOC roles, technologies, and use cases Helps students systematically assess the maturity of existing security operation environments, and then improve them Guides students through developing their own SOC "playbook".
Security Operations Center is the complete guide to building, operating, and security operations center building operating and maintaining your soc Security Operations Centers in any environment.
Drawing on experience with hundreds of customers ranging from Fortune enterprises to large military organizations, three leading experts thoroughly review each SOC model, including virtual SOCs. Security Operations Center walks you through every phase required to establish and run an effective SOC, including all significant people, process, and technology capabilities.
The authors assess SOC technologies, strategy, infrastructure, governance, planning, implementation, and more. They take a holistic approach considering various commercial and open-source tools found in modern SOCs. This best-practice guide is written for anybody interested in learning how to develop, manage, or improve a SOC. A background in network security, management, and operations will be helpful but is not required.
Responding to Real-World Cyber Threats. Overview of Security Operations Center Technologies. Download the sample pages includes Chapter 2 and Index.
Building Your Own: Working with Outsourcing and Managed Service Providers Processes, Procedures, and Other Operational Documentation Improving Case and Investigation Management Systems Download the errata. Get unlimited day access to over 30, books about UX security operations center building operating and maintaining your soc, leadership, project management, teams, agile development, analytics, core programming, and so much more.
All rights reserved. Join Sign In. View Larger Image. Security Operations Center: Book Your Price: Features How to organize IT security for an era of unprecedented, fast-changing, and increasingly complex threats Thoroughly iostream h in c vista SOC roles, technologies, and use cases Helps students systematically assess the maturity of existing security operation environments, and then improve them Guides students through developing their own SOC "playbook".
Copyright Dimensions: Errata Download the errata Submit Errata. Unlimited one-month access with your purchase. See Details. Investigating the Cyber Breach: About Affiliates Cisco Systems, Inc.