Key Features
- Understand and analyze various modern cyber threats and attackers' techniques
- Gain in-depth knowledge of email security, Windows, firewall, proxy, WAF, and security solution logs
- Explore popular cyber threat intelligence platforms to investigate suspicious artifacts
Who this book is for
This book is for Security Operation Center (SOC) analysts, security professionals, cybersecurity incident investigators, incident handlers, incident responders, or anyone looking to explore attacker techniques and delve deeper into detecting and investigating attacks. If you want to efficiently detect and investigate cyberattacks by analyzing logs generated from different log sources, then this is the book for you. Basic knowledge of cybersecurity and networking domains and entry-level security concepts are necessary to get the most out of this book.