Security Operations Center: Building, Operating, and Maintaining your SOC
Author | : | |
Rating | : | 4.10 (863 Votes) |
Asin | : | 0134052013 |
Format Type | : | paperback |
Number of Pages | : | 448 Pages |
Publish Date | : | 2014-02-18 |
Language | : | English |
DESCRIPTION:
A background in network security, management, and operations will be helpful but is not required. Drawing on experience with hundreds of customers ranging from Fortune 500 enterprises to large military organizations, three leading experts thoroughly review each SOC model, including virtual SOCs. It is also an indispensable resource for anyone preparing for the Cisco SCYBER exam. · Review high-level issues, such as vulnerability and risk management, threat intelligence, digital investigation, and data collection/analysis· Understand the technical components of a modern SOC· Assess the current state of your SOC and identify areas of improvement· Plan SOC strategy, mission, functions, and services· Design and build out SOC infrastructure, from facilities and networks to systems, storage, and physical security· Collect and successfu
He has been involved with the design and implementation of multiple projects, ranging from Fortune 500 corporations to large federal networks. He is also CCIE Security certified. He currently holds a Masters degree from the University of Toronto and has also been a long-time (ISC)2 instructor. His work involved him working with organizations such as Google, Microsoft, Cisco, Mozilla, OpenSSL, and many others, mainly to help them assess and fix major findings in the Transport Layer Security/Secure Sockets Layer (TLS/SSL) protocol. Nadhem is a senior security solution architect working for Cisco Systems. Joseph started his career in software development and later managed networks as a contracted technical resource. About the AuthorJoseph Muniz is a consultant at Cisco Systems and security researcher. As an architect, manager, and consultant, he has worked with a wide range of public and private sector organizations around the world to design, build, and
He currently holds a Masters degree from the University of Toronto and has also been a long-time (ISC)2 instructor. Nadhem is a senior security solution architect working for Cisco Systems. Dr. Check out his blog, thesecurityblogger, which showcases the latest security events, research, and technologies. research, Nadhem published a number of papers in prestige conferences, such as IEEE S&P and USENIX Security, mainly around cryptoanalysis topics. His
This book does an excellent job in many areas Aamir Lakhani SOCs or security operation centers are difficult to setup, maintain and operate. It is a massive task, and the sum of the entire task is very difficult to articulate. This book does an excellent job in many areas.The book should appeal to professionals and newcomers alike. I would recommend it as required reading for anyone involved in a SOC. Technologies may get updated, techniques may change, but the fundamental principals will stay the same, and this book covers them.Newcomers to the SOC business will learn the challenges of building a SOC, the fundamental steps needed to ope. "Both complete and practical" according to Nick A Kelly. "The complete practical guide to planning, building and operating an effective Security Operations Center" sums it up nicely. The key to this read is that it is both complete and practical. Muniz and McIntyre cover all the relevant points, including tactical day to day operations, process and procedure, disaster recovery and business continuity planning, and organization. The guide is peppered with stories that are experienced by CIO's and CISO's every day as we continue to adapt defenses against the changing threat landscape. This handbook is a great resource for professionals . An indispensable guide for those designing, managing or deploying a SOC Ben Rothke Large enterprises have numerous information security challenges. Aside from the external threats; there’s the onslaught of security data from disparate systems, platforms and applications. Getting a handle on the security output from numerous point solutions, generating millions of messages and alerts daily is not a trivial endeavor. As attacks becoming more frequent and sophisticated and with regulatory compliance issues placing an increasing burden, there needs to be a better way to manage all of this.Getting the raw hardware, software and people to create a SOC is not t