Author: Aamir Lakhani
Publisher: Packt Publishing Ltd
ISBN: 1849696276
Category : Computers
Languages : en
Pages : 86
Book Description
Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. Written in a user friendly style, this guide will get readers up and running with XenMobile MDM.If you want to run your mobile enterprises on XenMobile, or work on a BYOD strategy within your organization, then this is the ideal book for you. XenMobile MDM comprehensively explores how to set up and use XenMobile to provision, secure, and manage mobile devices.
Instant XenMobile MDM
Instant Play Framework Starter
Author: Daniel Dietrich
Publisher: Packt Publishing Ltd
ISBN: 1782162917
Category : Computers
Languages : en
Pages : 140
Book Description
Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks.A practical, quick, and hands-on guide to the Play Framework.This book is written for readers interested in developing web applications with Java or Scala. A basic knowledge of either Java or Scala is helpful. Prior experience with Play is not required.
Publisher: Packt Publishing Ltd
ISBN: 1782162917
Category : Computers
Languages : en
Pages : 140
Book Description
Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks.A practical, quick, and hands-on guide to the Play Framework.This book is written for readers interested in developing web applications with Java or Scala. A basic knowledge of either Java or Scala is helpful. Prior experience with Play is not required.
Apple Device Management
Author: Charles Edge
Publisher: Apress
ISBN: 1484253884
Category : Computers
Languages : en
Pages : 796
Book Description
Working effectively with Apple platforms at a corporate or business level includes not only infrastructure, but a mode of thinking that administrators have to adopt to find success. A mode of thinking that forces you to leave 30 years of IT dogma at the door. This book is a guide through how to integrate Apple products in your environment with a minimum of friction. Because the Apple ecosystem is not going away. You'll start by understanding where Apple, third-party software vendors, and the IT community is taking us. What is Mobile Device Management and how does it work under the hood. By understanding how MDM works, you will understand what needs to happen on your networks in order to allow for MDM, as well as the best way to give the least amount of access to the servers or services that’s necessary. You'll then look at management agents that do not include MDM, as well as when you will need to use an agent as opposed to when to use other options. Once you can install a management solution, you can deploy profiles on a device or you can deploy profiles on Macs using scripts. With Apple Device Management as your guide, you'll customize and package software for deployment and lock down devices so they’re completely secure. You’ll also work on getting standard QA environments built out, so you can test more effectively with less effort. Apple is forging their own path in IT. They trade spots with Amazon, Google, and Microsoft as the wealthiest company to ever exist. And they will not be constrained by 30 or more years of dogma in the IT industry. You can try to shoehorn Apple devices into outdated modes of device management, or you can embrace Apple’s stance on management with the help of this book. What You'll LearnDeploy profiles across devices effectively and securely Install apps remotely both from the app store and through custom solutions Work natively with Apple environments rather than retrofitting older IT solutions Who This Book Is For Mac administrators within organizations that want to integrate with the current Apple ecosystem, including Windows administrators learning how to use/manage Macs, mobile administrators working with iPhones and iPads, and mobile developers tasked with creating custom apps for internal, corporate distribution.
Publisher: Apress
ISBN: 1484253884
Category : Computers
Languages : en
Pages : 796
Book Description
Working effectively with Apple platforms at a corporate or business level includes not only infrastructure, but a mode of thinking that administrators have to adopt to find success. A mode of thinking that forces you to leave 30 years of IT dogma at the door. This book is a guide through how to integrate Apple products in your environment with a minimum of friction. Because the Apple ecosystem is not going away. You'll start by understanding where Apple, third-party software vendors, and the IT community is taking us. What is Mobile Device Management and how does it work under the hood. By understanding how MDM works, you will understand what needs to happen on your networks in order to allow for MDM, as well as the best way to give the least amount of access to the servers or services that’s necessary. You'll then look at management agents that do not include MDM, as well as when you will need to use an agent as opposed to when to use other options. Once you can install a management solution, you can deploy profiles on a device or you can deploy profiles on Macs using scripts. With Apple Device Management as your guide, you'll customize and package software for deployment and lock down devices so they’re completely secure. You’ll also work on getting standard QA environments built out, so you can test more effectively with less effort. Apple is forging their own path in IT. They trade spots with Amazon, Google, and Microsoft as the wealthiest company to ever exist. And they will not be constrained by 30 or more years of dogma in the IT industry. You can try to shoehorn Apple devices into outdated modes of device management, or you can embrace Apple’s stance on management with the help of this book. What You'll LearnDeploy profiles across devices effectively and securely Install apps remotely both from the app store and through custom solutions Work natively with Apple environments rather than retrofitting older IT solutions Who This Book Is For Mac administrators within organizations that want to integrate with the current Apple ecosystem, including Windows administrators learning how to use/manage Macs, mobile administrators working with iPhones and iPads, and mobile developers tasked with creating custom apps for internal, corporate distribution.
From IT Pro to Cloud Pro Microsoft Office 365 and SharePoint Online
Author: Ben Curry
Publisher: Microsoft Press
ISBN: 1509304185
Category : Computers
Languages : en
Pages : 574
Book Description
This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book. Modernize your IT skills for the new world of cloud computing! Whether you are an IT administrator, developer, or architect, cloud technologies are transforming your role. This guide brings together the knowledge you need to transition smoothly to Microsoft Office 365 cloud-only and hybrid environments. Microsoft MVP Ben Curry and leading cloud architect Brian Laws present specific, up-to-date guidance on administering key cloud technologies, including Microsoft Office 365, SharePoint Online, Azure AD, and OneDrive for Business. Microsoft cloud technology experts Ben Curry and Brian Laws show you how to: Anticipate and respond to the ways cloud technologies change your responsibilities, such as scripting key management tasks via Windows PowerShell Understand today’s new mix of essential “Cloud Pro” skills related to infrastructure, scripting, security, and networking Master modern cloud administration for Office 365 cloud and hybrid environments to deliver content and services, any time, on any device, from anywhere, and across organizational boundaries Administer and configure SharePoint Online, including services, site collections, and hybrid features Help secure client devices via Mobile Device Management for Office 365 Centrally manage user profiles, groups, apps, and social features Bridge Office 365 and on-premises environments to share identities and data Enforce governance, security, and compliance
Publisher: Microsoft Press
ISBN: 1509304185
Category : Computers
Languages : en
Pages : 574
Book Description
This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book. Modernize your IT skills for the new world of cloud computing! Whether you are an IT administrator, developer, or architect, cloud technologies are transforming your role. This guide brings together the knowledge you need to transition smoothly to Microsoft Office 365 cloud-only and hybrid environments. Microsoft MVP Ben Curry and leading cloud architect Brian Laws present specific, up-to-date guidance on administering key cloud technologies, including Microsoft Office 365, SharePoint Online, Azure AD, and OneDrive for Business. Microsoft cloud technology experts Ben Curry and Brian Laws show you how to: Anticipate and respond to the ways cloud technologies change your responsibilities, such as scripting key management tasks via Windows PowerShell Understand today’s new mix of essential “Cloud Pro” skills related to infrastructure, scripting, security, and networking Master modern cloud administration for Office 365 cloud and hybrid environments to deliver content and services, any time, on any device, from anywhere, and across organizational boundaries Administer and configure SharePoint Online, including services, site collections, and hybrid features Help secure client devices via Mobile Device Management for Office 365 Centrally manage user profiles, groups, apps, and social features Bridge Office 365 and on-premises environments to share identities and data Enforce governance, security, and compliance
CompTIA A+ Core 1 (220-1001) and Core 2 (220-1002) Cert Guide
Author: Richard McDonald
Publisher: Pearson IT Certification
ISBN: 0135300037
Category : Computers
Languages : en
Pages : 1669
Book Description
This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book. Learn, prepare, and practice for CompTIA A+ Core 1 (220-1001) and Core 2 (220-1002) exam success with this CompTIA Cert Guide from Pearson IT Certification, a leader in IT Certification learning. Master CompTIA A+ Core 1 (220-1001) and Core 2 (220-1002) exam topics Assess your knowledge with chapter-ending quizzes Review key concepts with exam preparation tasks Practice with realistic exam questions Get practical guidance for next steps and more advanced certifications CompTIA A+ Cert Guide Core 1 (220-1001) and Core 2 (220-1002), Fifth Edition is a best-of-breed exam study guide. Leading IT certification instructor Rick McDonald shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan. Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this CompTIA study guide helps you master the concepts and techniques that will allow you to succeed on the exam the first time. The CompTIA study guide helps you master all the topics on the A+ Core 1 (220-1001) and Core 2 (220-1002) exams, including: Core 1 (220-1001): Mobile devices, networking, hardware, virtualization and cloud computing, and hardware and network troubleshooting Core 2 (220-1002): Operating systems, security, software troubleshooting, and operational procedures Extensive improvements in this edition include: new content on Windows 10, Chrome OS, security, scripting, and remote access; expanded coverage of troubleshooting, operational procedures, laptop teardown, subassembly replacement, and virtualization; new coverage of Linux and macOS troubleshooting; new MacBook coverage; updated coverage of processors, BIOSes (including UEFI); USB 3.1 and USB-Type C; mobile device teardown; hardware upgrades; dealing with prohibited content/activity; Windows features and upgrade paths; and network and cloud computing.
Publisher: Pearson IT Certification
ISBN: 0135300037
Category : Computers
Languages : en
Pages : 1669
Book Description
This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book. Learn, prepare, and practice for CompTIA A+ Core 1 (220-1001) and Core 2 (220-1002) exam success with this CompTIA Cert Guide from Pearson IT Certification, a leader in IT Certification learning. Master CompTIA A+ Core 1 (220-1001) and Core 2 (220-1002) exam topics Assess your knowledge with chapter-ending quizzes Review key concepts with exam preparation tasks Practice with realistic exam questions Get practical guidance for next steps and more advanced certifications CompTIA A+ Cert Guide Core 1 (220-1001) and Core 2 (220-1002), Fifth Edition is a best-of-breed exam study guide. Leading IT certification instructor Rick McDonald shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan. Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this CompTIA study guide helps you master the concepts and techniques that will allow you to succeed on the exam the first time. The CompTIA study guide helps you master all the topics on the A+ Core 1 (220-1001) and Core 2 (220-1002) exams, including: Core 1 (220-1001): Mobile devices, networking, hardware, virtualization and cloud computing, and hardware and network troubleshooting Core 2 (220-1002): Operating systems, security, software troubleshooting, and operational procedures Extensive improvements in this edition include: new content on Windows 10, Chrome OS, security, scripting, and remote access; expanded coverage of troubleshooting, operational procedures, laptop teardown, subassembly replacement, and virtualization; new coverage of Linux and macOS troubleshooting; new MacBook coverage; updated coverage of processors, BIOSes (including UEFI); USB 3.1 and USB-Type C; mobile device teardown; hardware upgrades; dealing with prohibited content/activity; Windows features and upgrade paths; and network and cloud computing.
Mobile Platform Security
Author: N. Asokan
Publisher: Morgan & Claypool Publishers
ISBN: 1627050981
Category : Computers
Languages : en
Pages : 110
Book Description
Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrates commonly used security mechanisms and techniques in mobile devices and allows a systematic comparison of different platforms. We analyze several mobile platforms using the model. In addition, this book explains hardware-security mechanisms typically present in a mobile device. We also discuss enterprise security extensions for mobile platforms and survey recent research in the area of mobile platform security. The objective of this book is to provide a comprehensive overview of the current status of mobile platform security for students, researchers, and practitioners. Table of Contents: Preface / Introduction / Platform Security Model / Mobile Platforms / Platform Comparison / Mobile Hardware Security / Enterprise Security Extensions / Platform Security Research / Conclusions / Bibliography / Authors' Biographies
Publisher: Morgan & Claypool Publishers
ISBN: 1627050981
Category : Computers
Languages : en
Pages : 110
Book Description
Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrates commonly used security mechanisms and techniques in mobile devices and allows a systematic comparison of different platforms. We analyze several mobile platforms using the model. In addition, this book explains hardware-security mechanisms typically present in a mobile device. We also discuss enterprise security extensions for mobile platforms and survey recent research in the area of mobile platform security. The objective of this book is to provide a comprehensive overview of the current status of mobile platform security for students, researchers, and practitioners. Table of Contents: Preface / Introduction / Platform Security Model / Mobile Platforms / Platform Comparison / Mobile Hardware Security / Enterprise Security Extensions / Platform Security Research / Conclusions / Bibliography / Authors' Biographies
CompTIA A+ Complete Practice Tests
Author: Jeff T. Parker
Publisher: John Wiley & Sons
ISBN: 1119516978
Category : Computers
Languages : en
Pages : 560
Book Description
Test your knowledge and know what to expect on A+ exam day CompTIA A+ Complete Practice Tests, Second Edition enables you to hone your test-taking skills, focus on challenging areas, and be thoroughly prepared to ace the exam and earn your A+ certification. This essential component of your overall study plan presents nine unique practice tests—and two 90-question bonus tests—covering 100% of the objective domains for both the 220-1001 and 220-1002 exams. Comprehensive coverage of every essential exam topic ensures that you will know what to expect on exam day and maximize your chances for success. Over 1200 practice questions on topics including hardware, networking, mobile devices, operating systems and procedures, troubleshooting, and more, lets you assess your performance and gain the confidence you need to pass the exam with flying colors. This second edition has been fully updated to reflect the latest best practices and updated exam objectives you will see on the big day. A+ certification is a crucial step in your IT career. Many businesses require this accreditation when hiring computer technicians or validating the skills of current employees. This collection of practice tests allows you to: Access the test bank in the Sybex interactive learning environment Understand the subject matter through clear and accurate answers and explanations of exam objectives Evaluate your exam knowledge and concentrate on problem areas Integrate practice tests with other Sybex review and study guides, including the CompTIA A+ Complete Study Guide and the CompTIA A+ Complete Deluxe Study Guide Practice tests are an effective way to increase comprehension, strengthen retention, and measure overall knowledge. The CompTIA A+ Complete Practice Tests, Second Edition is an indispensable part of any study plan for A+ certification.
Publisher: John Wiley & Sons
ISBN: 1119516978
Category : Computers
Languages : en
Pages : 560
Book Description
Test your knowledge and know what to expect on A+ exam day CompTIA A+ Complete Practice Tests, Second Edition enables you to hone your test-taking skills, focus on challenging areas, and be thoroughly prepared to ace the exam and earn your A+ certification. This essential component of your overall study plan presents nine unique practice tests—and two 90-question bonus tests—covering 100% of the objective domains for both the 220-1001 and 220-1002 exams. Comprehensive coverage of every essential exam topic ensures that you will know what to expect on exam day and maximize your chances for success. Over 1200 practice questions on topics including hardware, networking, mobile devices, operating systems and procedures, troubleshooting, and more, lets you assess your performance and gain the confidence you need to pass the exam with flying colors. This second edition has been fully updated to reflect the latest best practices and updated exam objectives you will see on the big day. A+ certification is a crucial step in your IT career. Many businesses require this accreditation when hiring computer technicians or validating the skills of current employees. This collection of practice tests allows you to: Access the test bank in the Sybex interactive learning environment Understand the subject matter through clear and accurate answers and explanations of exam objectives Evaluate your exam knowledge and concentrate on problem areas Integrate practice tests with other Sybex review and study guides, including the CompTIA A+ Complete Study Guide and the CompTIA A+ Complete Deluxe Study Guide Practice tests are an effective way to increase comprehension, strengthen retention, and measure overall knowledge. The CompTIA A+ Complete Practice Tests, Second Edition is an indispensable part of any study plan for A+ certification.
CEH v10 Certified Ethical Hacker Study Guide
Author: Ric Messier
Publisher: John Wiley & Sons
ISBN: 1119533198
Category : Computers
Languages : en
Pages : 592
Book Description
As protecting information becomes a rapidly growing concern for today’s businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10) certification. The CEH v10 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instruction. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include intrusion detection, DDoS attacks, buffer overflows, virus creation, and more. This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you’ve learned into the context of actual job roles. Gain a unique certification that allows you to understand the mind of a hacker Expand your career opportunities with an IT certificate that satisfies the Department of Defense’s 8570 Directive for Information Assurance positions Fully updated for the 2018 CEH v10 exam, including the latest developments in IT security Access the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Thanks to its clear organization, all-inclusive coverage, and practical instruction, the CEH v10 Certified Ethical Hacker Study Guide is an excellent resource for anyone who needs to understand the hacking process or anyone who wants to demonstrate their skills as a Certified Ethical Hacker.
Publisher: John Wiley & Sons
ISBN: 1119533198
Category : Computers
Languages : en
Pages : 592
Book Description
As protecting information becomes a rapidly growing concern for today’s businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10) certification. The CEH v10 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instruction. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include intrusion detection, DDoS attacks, buffer overflows, virus creation, and more. This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you’ve learned into the context of actual job roles. Gain a unique certification that allows you to understand the mind of a hacker Expand your career opportunities with an IT certificate that satisfies the Department of Defense’s 8570 Directive for Information Assurance positions Fully updated for the 2018 CEH v10 exam, including the latest developments in IT security Access the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Thanks to its clear organization, all-inclusive coverage, and practical instruction, the CEH v10 Certified Ethical Hacker Study Guide is an excellent resource for anyone who needs to understand the hacking process or anyone who wants to demonstrate their skills as a Certified Ethical Hacker.
Security Operations Center
Author: Joseph Muniz
Publisher: Cisco Press
ISBN: 013405203X
Category : Computers
Languages : en
Pages : 658
Book Description
Security Operations Center Building, Operating, and Maintaining Your SOC The complete, practical guide to planning, building, and operating an effective Security Operations Center (SOC) Security Operations Center is the complete guide to building, operating, and managing Security Operations Centers in any environment. Drawing on experience with hundreds of customers ranging from Fortune 500 enterprises to large military organizations, three leading experts thoroughly review each SOC model, including virtual SOCs. You’ll learn how to select the right strategic option for your organization, and then plan and execute the strategy you’ve chosen. Security Operations Center walks you through every phase required to establish and run an effective SOC, including all significant people, process, and technology capabilities. The authors assess SOC technologies, strategy, infrastructure, governance, planning, implementation, and more. They take a holistic approach considering various commercial and open-source tools found in modern SOCs. This best-practice guide is written for anybody interested in learning how to develop, manage, or improve a SOC. A background in network security, management, and operations will be helpful but is not required. It is also an indispensable resource for anyone preparing for the Cisco SCYBER exam. · Review high-level issues, such as vulnerability and risk management, threat intelligence, digital investigation, and data collection/analysis · Understand the technical components of a modern SOC · Assess the current state of your SOC and identify areas of improvement · Plan SOC strategy, mission, functions, and services · Design and build out SOC infrastructure, from facilities and networks to systems, storage, and physical security · Collect and successfully analyze security data · Establish an effective vulnerability management practice · Organize incident response teams and measure their performance · Define an optimal governance and staffing model · Develop a practical SOC handbook that people can actually use · Prepare SOC to go live, with comprehensive transition plans · React quickly and collaboratively to security incidents · Implement best practice security operations, including continuous enhancement and improvement
Publisher: Cisco Press
ISBN: 013405203X
Category : Computers
Languages : en
Pages : 658
Book Description
Security Operations Center Building, Operating, and Maintaining Your SOC The complete, practical guide to planning, building, and operating an effective Security Operations Center (SOC) Security Operations Center is the complete guide to building, operating, and managing Security Operations Centers in any environment. Drawing on experience with hundreds of customers ranging from Fortune 500 enterprises to large military organizations, three leading experts thoroughly review each SOC model, including virtual SOCs. You’ll learn how to select the right strategic option for your organization, and then plan and execute the strategy you’ve chosen. Security Operations Center walks you through every phase required to establish and run an effective SOC, including all significant people, process, and technology capabilities. The authors assess SOC technologies, strategy, infrastructure, governance, planning, implementation, and more. They take a holistic approach considering various commercial and open-source tools found in modern SOCs. This best-practice guide is written for anybody interested in learning how to develop, manage, or improve a SOC. A background in network security, management, and operations will be helpful but is not required. It is also an indispensable resource for anyone preparing for the Cisco SCYBER exam. · Review high-level issues, such as vulnerability and risk management, threat intelligence, digital investigation, and data collection/analysis · Understand the technical components of a modern SOC · Assess the current state of your SOC and identify areas of improvement · Plan SOC strategy, mission, functions, and services · Design and build out SOC infrastructure, from facilities and networks to systems, storage, and physical security · Collect and successfully analyze security data · Establish an effective vulnerability management practice · Organize incident response teams and measure their performance · Define an optimal governance and staffing model · Develop a practical SOC handbook that people can actually use · Prepare SOC to go live, with comprehensive transition plans · React quickly and collaboratively to security incidents · Implement best practice security operations, including continuous enhancement and improvement
The Modern Security Operations Center
Author: Joseph Muniz
Publisher: Addison-Wesley Professional
ISBN: 0135619742
Category : Computers
Languages : en
Pages : 969
Book Description
The Industry Standard, Vendor-Neutral Guide to Managing SOCs and Delivering SOC Services This completely new, vendor-neutral guide brings together all the knowledge you need to build, maintain, and operate a modern Security Operations Center (SOC) and deliver security services as efficiently and cost-effectively as possible. Leading security architect Joseph Muniz helps you assess current capabilities, align your SOC to your business, and plan a new SOC or evolve an existing one. He covers people, process, and technology; explores each key service handled by mature SOCs; and offers expert guidance for managing risk, vulnerabilities, and compliance. Throughout, hands-on examples show how advanced red and blue teams execute and defend against real-world exploits using tools like Kali Linux and Ansible. Muniz concludes by previewing the future of SOCs, including Secure Access Service Edge (SASE) cloud technologies and increasingly sophisticated automation. This guide will be indispensable for everyone responsible for delivering security services—managers and cybersecurity professionals alike. * Address core business and operational requirements, including sponsorship, management, policies, procedures, workspaces, staffing, and technology * Identify, recruit, interview, onboard, and grow an outstanding SOC team * Thoughtfully decide what to outsource and what to insource * Collect, centralize, and use both internal data and external threat intelligence * Quickly and efficiently hunt threats, respond to incidents, and investigate artifacts * Reduce future risk by improving incident recovery and vulnerability management * Apply orchestration and automation effectively, without just throwing money at them * Position yourself today for emerging SOC technologies
Publisher: Addison-Wesley Professional
ISBN: 0135619742
Category : Computers
Languages : en
Pages : 969
Book Description
The Industry Standard, Vendor-Neutral Guide to Managing SOCs and Delivering SOC Services This completely new, vendor-neutral guide brings together all the knowledge you need to build, maintain, and operate a modern Security Operations Center (SOC) and deliver security services as efficiently and cost-effectively as possible. Leading security architect Joseph Muniz helps you assess current capabilities, align your SOC to your business, and plan a new SOC or evolve an existing one. He covers people, process, and technology; explores each key service handled by mature SOCs; and offers expert guidance for managing risk, vulnerabilities, and compliance. Throughout, hands-on examples show how advanced red and blue teams execute and defend against real-world exploits using tools like Kali Linux and Ansible. Muniz concludes by previewing the future of SOCs, including Secure Access Service Edge (SASE) cloud technologies and increasingly sophisticated automation. This guide will be indispensable for everyone responsible for delivering security services—managers and cybersecurity professionals alike. * Address core business and operational requirements, including sponsorship, management, policies, procedures, workspaces, staffing, and technology * Identify, recruit, interview, onboard, and grow an outstanding SOC team * Thoughtfully decide what to outsource and what to insource * Collect, centralize, and use both internal data and external threat intelligence * Quickly and efficiently hunt threats, respond to incidents, and investigate artifacts * Reduce future risk by improving incident recovery and vulnerability management * Apply orchestration and automation effectively, without just throwing money at them * Position yourself today for emerging SOC technologies