ebooks and download videos Search All  Title  Author 
Home / Nonfiction / Computers / Networking / Vendor Specific

Security Operations Center: Building, Operating, and Maintaining your SOC

| £36.65 | €41.22 | Ca$59.47 | Au$58.69
by Joseph Muniz & Gary McIntyre & Nadhem AlFardan
What is this?DRM-EPUB by download  |  $43.99
What is this?DRM-PDF by download  |  $43.99
add to wish list
Security Operations Center: Building, Operating, and Maintaining your SOC by Joseph Muniz & Gary McIntyre & Nadhem AlFardan

Security Operations Center

Building, Operating, and Maintaining Your SOC

The complete, practical guide to planning, building, and operating an effective Security Operations Center (SOC)

Security Operations Center is the complete guide to building, operating, and managing Security Operations Centers in any environment. Drawing on experience with hundreds of customers ranging from Fortune 500 enterprises to large military organizations, three leading experts thoroughly review each SOC model, including virtual SOCs. You??ll learn how to select the right strategic option for your organization, and then plan and execute the strategy you??ve chosen.

Security Operations Center walks you through every phase required to establish and run an effective SOC, including all significant people, process, and technology capabilities. The authors assess SOC technologies, strategy, infrastructure, governance, planning, implementation, and more. They take a holistic approach considering various commercial and open-source tools found in modern SOCs.

This best-practice guide is written for anybody interested in learning how to develop, manage, or improve a SOC. A background in network security, management, and operations will be helpful but is not required. It is also an indispensable resource for anyone preparing for the Cisco SCYBER exam.

· Review high-level issues, such as vulnerability and risk management, threat intelligence, digital investigation, and data collection/analysis

· Understand the technical components of a modern SOC

· Assess the current state of your SOC and identify areas of improvement

· Plan SOC strategy, mission, functions, and services

· Design and build out SOC infrastructure, from facilities and networks to systems, storage, and physical security

· Collect and successfully analyze security data

· Establish an effective vulnerability management practice

· Organize incident response teams and measure their performance

· Define an optimal governance and staffing model

· Develop a practical SOC handbook that people can actually use

· Prepare SOC to go live, with comprehensive transition plans

· React quickly and collaboratively to security incidents

· Implement best practice security operations, including continuous enhancement and improvement

To view this DRM protected ebook on your desktop or laptop you will need to have Adobe Digital Editions installed. It is a free software. We also strongly recommend that you sign up for an AdobeID at the Adobe website. For more details please see FAQ 1&2. To view this ebook on an iPhone, iPad or Android mobile device you will need the Adobe Digital Editions app, or BlueFire Reader or Txtr app. These are free, too. For more details see this article.

SHARE  Share by Email  Share on Facebook  Share on Twitter  Share on Linked In  Share on Delicious
or call in the US toll free 1-888-866-9150 product ID: 788803

Ebook Details
Pages: 448
Size: 6.3 MB
Publisher: Cisco Press
Date published:   2015
ISBN: 9780134052038 (DRM-EPUB)
9780134052069 (DRM-PDF)

DRM Settings
Copying:of 30 selections every 30 days allowed
Printing:of 30 pages every 30 days allowed
Read Aloud:  allowed

Territory Restrictions
This ebook will NOT be sold to customers with a billing address in:
Afghanistan, Algeria, Belarus, Bosnia and Herzegowina, Congo, Congo (The Democratic Republic of the), Cote D'Ivoire, Cuba, Indonesia, Iran (Islamic Republic of), Iraq, Korea (Democratic People's Republic of), Liberia, Libyan Arab Jamahiriya, Macedonia (The Former Yugoslav Republic of), Myanmar, Nigeria, Sudan, Syrian Arab Republic, Zimbabwe

This product is listed in the following category:

Nonfiction > Computers > Networking > Vendor Specific

These authors have products in the following categories:

Nonfiction > Computers > Networking > Network Protocols
Nonfiction > Computers > Operating Systems > Linux
Nonfiction > Computers > Networking > Security
Nonfiction > Computers > Networking > Vendor Specific

If you find anything wrong with this product listing, perhaps the description is wrong, the author is incorrect, or it is listed in the wrong category, then please contact us. We will promptly address your feedback.

Submit 5 page SummaryWhat is this?

© 2016