Skip to content
Scan a barcode
Scan
Added to your cart
Paperback Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs Book

ISBN: 1801814686

ISBN13: 9781801814683

Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Paperback

Condition: Very Good

$25.39
Save $21.60!
List Price $46.99
Almost Gone, Only 1 Left!

You Might Also Enjoy

System Design Interview - An insider's guide
System Design Interview - An insider's guide
Alex Xu

from: $33.59

HTML and CSS: Design and Build Websites
HTML and CSS: Design and Build Websites
Jon Duckett

from: $5.99

Mastering Monero: The future of private transactions
Mastering Monero: The future of private transactions
SerHack

from: $19.99

How to Think Like a Manager for the CISSP Exam
How to Think Like a Manager for the CISSP Exam
Luke Ahmed

from: $26.80

Access for Dummies
Access for Dummies
Laurie A Ulrich, Ken Cook

from: $10.19

A Seniors Guide to the iPhone SE (3rd Generation): Getting Started with the the 2022 iPhone SE
A Seniors Guide to the iPhone SE (3rd Generation): Getting Started with the the 2022 iPhone SE
Scott La Counte

from: $19.80

Teach Yourself Visually iPhone 14
Teach Yourself Visually iPhone 14
Guy Hart-Davis

from: $25.69

iPhone 12 User Guide for Seniors: Easily Master the Latest Version of Your iPhone Thanks to Step-by-Step Tutorials, Large Texts, and Illustrations. You Won’t Feel in Denial Anymore!
iPhone 12 User Guide for Seniors: Easily Master the Latest Version of Your iPhone Thanks to Step-by-Step Tutorials, Large Texts, and Illustrations. You Won’t Feel in Denial Anymore!
Brandon Ballard

from: $20.69

Windows 10 for Seniors for Dummies
Windows 10 for Seniors for Dummies
Peter Weverka

from: $4.99

The Personal Cybersecurity Manual: How Anyone Can Protect Themselves from Fraud, Identity Theft, and Other Cybercrimes
The Personal Cybersecurity Manual: How Anyone Can Protect Themselves from Fraud, Identity Theft, and Other Cybercrimes
Marlon Buchanan

from: $15.74

Html5: Learn Html and Css With a Complete Tutorial Guide
Html5: Learn Html and Css With a Complete Tutorial Guide
Shawn Catlett

from: $16.35

FreeCAD 0.20 Learn by doing
FreeCAD 0.20 Learn by doing
Tutorial Books

from: $25.21

Getting Started With Ubuntu OS: A Ridiculously Simple Guide to the Linux Open Source Operating System
Getting Started With Ubuntu OS: A Ridiculously Simple Guide to the Linux Open Source Operating System
Lewis Richards, NOW Series, Scott La Counte

from: $10.48

Power Pivot and Power BI: The Excel User's Guide to DAX, Power Query, Power BI Power Pivot in Excel 2010-2016
Power Pivot and Power BI: The Excel User's Guide to DAX, Power Query, Power BI Power Pivot in Excel 2010-2016
Rob Collie, Avichal Singh

from: $22.62

Cybersecurity First Principles: A Reboot of Strategy and Tactics
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Rick Howard

from: $22.70

Data Structures and Algorithms in Python
Data Structures and Algorithms in Python
Robert Method Karamagi

from: $20.00

Vintage Laptop Computers: First Decade: 1980-89
Vintage Laptop Computers: First Decade: 1980-89
James E. Wilson

from: $14.54

A Hacker's Mind
A Hacker's Mind

Out of Stock

Book Overview

Learn cyber threat intelligence fundamentals to implement and operationalize an organizational intelligence program


Key Features:

Develop and implement a threat intelligence program from scratchDiscover techniques to perform cyber threat intelligence, collection, and analysis using open-source toolsLeverage a combination of theory and practice that will help you prepare a solid foundation for operationalizing threat intelligence programs


Book Description:

We're living in an era where cyber threat intelligence is becoming more important. Cyber threat intelligence routinely informs tactical and strategic decision-making throughout organizational operations. However, finding the right resources on the fundamentals of operationalizing a threat intelligence function can be challenging, and that's where this book helps.


In Operationalizing Threat Intelligence, you'll explore cyber threat intelligence in five fundamental areas - defining threat intelligence, developing threat intelligence, collecting threat intelligence, enrichment and analysis, and finally production of threat intelligence. You'll start by finding out what threat intelligence is and where it can be applied. Next, you'll discover techniques for performing cyber threat intelligence collection and analysis using open-source tools. The book also examines commonly used frameworks and policies as well as fundamental operational security concepts. Later, you'll focus on enriching and analyzing threat intelligence through pivoting and threat hunting. Finally, you'll examine detailed mechanisms for the production of intelligence.


By the end of this book, you'll be equipped with the right tools and have understood what it takes to operationalize your own threat intelligence function, from collection to production.


What You Will Learn:

Discover types of threat actors and their common tactics and techniquesUnderstand the core tenets of cyber threat intelligenceDiscover cyber threat intelligence policies, procedures, and frameworksExplore the fundamentals relating to collecting cyber threat intelligenceUnderstand fundamentals about threat intelligence enrichment and analysisUnderstand what threat hunting and pivoting are, along with examplesFocus on putting threat intelligence into productionExplore techniques for performing threat analysis, pivoting, and hunting


Who this book is for:

This book is for cybersecurity professionals, security analysts, security enthusiasts, and anyone who is just getting started and looking to explore threat intelligence in more detail. Those working in different security roles will also be able to explore threat intelligence with the help of this security book.

Customer Reviews

0 customer rating | 0 review
There are currently no reviews. Be the first to review this work.
Copyright © 2025 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks ® and the ThriftBooks ® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured