did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

The Modern Security Operations Center

9780135619858

The Modern Security Operations Center

  • ISBN 13:

    9780135619858

  • ISBN 10:

    0135619858

  • Edition: 1st
  • Format: Paperback
  • Copyright: 12/07/2020
  • Publisher: Addison-Wesley Professional

List Price $59.99 Save

Rent $47.51
TERM PRICE DUE
Added Benefits of Renting

Free Shipping Both Ways Free Shipping Both Ways
Highlight/Take Notes Like You Own It Highlight/Take Notes Like You Own It
Purchase/Extend Before Due Date Purchase/Extend Before Due Date

List Price $59.99 Save $2.09

New $57.90

Usually Ships in 2-3 Business Days

We Buy This Book Back We Buy This Book Back!

Included with your book

Free Shipping On Every Order Free Shipping On Every Order

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Extend or Purchase Your Rental at Any Time

Need to keep your rental past your due date? At any time before your due date you can extend or purchase your rental through your account.

Summary

The Industry Standard, Vendor-Neutral Guide to Managing SOCs and Delivering SOC Services

This completely new, vendor-neutral guide brings together all the knowledge you need to build, maintain, and operate a modern Security Operations Center (SOC) and deliver security services as efficiently and cost-effectively as possible.

Leading security architect Joseph Muniz helps you assess current capabilities, align your SOC to your business, and plan a new SOC or evolve an existing one. He covers people, process, and technology; explores each key service handled by mature SOCs; and offers expert guidance for managing risk, vulnerabilities, and compliance. Throughout, hands-on examples show how advanced red and blue teams execute and defend against real-world exploits using tools like Kali Linux and Ansible. Muniz concludes by previewing the future of SOCs, including Secure Access Service Edge (SASE) cloud technologies and increasingly sophisticated automation.

This guide will be indispensable for everyone responsible for delivering security services—managers and cybersecurity professionals alike.

* Address core business and operational requirements, including sponsorship, management, policies, procedures, workspaces, staffing, and technology
* Identify, recruit, interview, onboard, and grow an outstanding SOC team
* Thoughtfully decide what to outsource and what to insource 
* Collect, centralize, and use both internal data and external threat intelligence
* Quickly and efficiently hunt threats, respond to incidents, and investigate artifacts
* Reduce future risk by improving incident recovery and vulnerability management
* Apply orchestration and automation effectively, without just throwing money at them
* Position yourself today for emerging SOC technologies

Author Biography

Read more