Dekorationsartikel gehören nicht zum Leistungsumfang.
Sprache:
Englisch
45,85 €*
Versandkostenfrei per Post / DHL
Lieferzeit 1-2 Wochen
Kategorien:
Beschreibung
Empower Your Digital Shield with Splunk Expertise!
Book Description
The Ultimate Splunk for Cybersecurity is your practical companion to utilizing Splunk for threat detection and security operations.
This in-depth guide begins with an introduction to Splunk and its role in cybersecurity, followed by a detailed discussion on configuring inputs and data sources, understanding Splunk architecture, and using Splunk Enterprise Security (ES).
It further explores topics such as data ingestion and normalization, understanding SIEM, and threat detection and response. It then delves into advanced analytics for threat detection, integration with other security tools, and automation and orchestration with Splunk.
Additionally, it covers cloud security with Splunk, DevOps, and security operations. Moreover, the book provides practical guidance on best practices for Splunk in cybersecurity, compliance, and regulatory requirements. It concludes with a summary of the key concepts covered throughout the book.
Table of Contents
1. Introduction to Splunk and Cybersecurity
2. Overview of Splunk Architecture
3. Configuring Inputs and Data Sources
4. Data Ingestion and Normalization
5. Understanding SIEM
6. Splunk Enterprise Security
7. Security Intelligence
8. Forensic Investigation in Security Domains
9. Splunk Integration with Other Security Tools
10. Splunk for Compliance and Regulatory Requirements
11. Security Orchestration, Automation and Response (SOAR) with Splunk
12. Cloud Security with Splunk
13. DevOps and Security Operations
14. Best Practices for Splunk in Cybersecurity
15. Conclusion and Summary
Index
Book Description
The Ultimate Splunk for Cybersecurity is your practical companion to utilizing Splunk for threat detection and security operations.
This in-depth guide begins with an introduction to Splunk and its role in cybersecurity, followed by a detailed discussion on configuring inputs and data sources, understanding Splunk architecture, and using Splunk Enterprise Security (ES).
It further explores topics such as data ingestion and normalization, understanding SIEM, and threat detection and response. It then delves into advanced analytics for threat detection, integration with other security tools, and automation and orchestration with Splunk.
Additionally, it covers cloud security with Splunk, DevOps, and security operations. Moreover, the book provides practical guidance on best practices for Splunk in cybersecurity, compliance, and regulatory requirements. It concludes with a summary of the key concepts covered throughout the book.
Table of Contents
1. Introduction to Splunk and Cybersecurity
2. Overview of Splunk Architecture
3. Configuring Inputs and Data Sources
4. Data Ingestion and Normalization
5. Understanding SIEM
6. Splunk Enterprise Security
7. Security Intelligence
8. Forensic Investigation in Security Domains
9. Splunk Integration with Other Security Tools
10. Splunk for Compliance and Regulatory Requirements
11. Security Orchestration, Automation and Response (SOAR) with Splunk
12. Cloud Security with Splunk
13. DevOps and Security Operations
14. Best Practices for Splunk in Cybersecurity
15. Conclusion and Summary
Index
Empower Your Digital Shield with Splunk Expertise!
Book Description
The Ultimate Splunk for Cybersecurity is your practical companion to utilizing Splunk for threat detection and security operations.
This in-depth guide begins with an introduction to Splunk and its role in cybersecurity, followed by a detailed discussion on configuring inputs and data sources, understanding Splunk architecture, and using Splunk Enterprise Security (ES).
It further explores topics such as data ingestion and normalization, understanding SIEM, and threat detection and response. It then delves into advanced analytics for threat detection, integration with other security tools, and automation and orchestration with Splunk.
Additionally, it covers cloud security with Splunk, DevOps, and security operations. Moreover, the book provides practical guidance on best practices for Splunk in cybersecurity, compliance, and regulatory requirements. It concludes with a summary of the key concepts covered throughout the book.
Table of Contents
1. Introduction to Splunk and Cybersecurity
2. Overview of Splunk Architecture
3. Configuring Inputs and Data Sources
4. Data Ingestion and Normalization
5. Understanding SIEM
6. Splunk Enterprise Security
7. Security Intelligence
8. Forensic Investigation in Security Domains
9. Splunk Integration with Other Security Tools
10. Splunk for Compliance and Regulatory Requirements
11. Security Orchestration, Automation and Response (SOAR) with Splunk
12. Cloud Security with Splunk
13. DevOps and Security Operations
14. Best Practices for Splunk in Cybersecurity
15. Conclusion and Summary
Index
Book Description
The Ultimate Splunk for Cybersecurity is your practical companion to utilizing Splunk for threat detection and security operations.
This in-depth guide begins with an introduction to Splunk and its role in cybersecurity, followed by a detailed discussion on configuring inputs and data sources, understanding Splunk architecture, and using Splunk Enterprise Security (ES).
It further explores topics such as data ingestion and normalization, understanding SIEM, and threat detection and response. It then delves into advanced analytics for threat detection, integration with other security tools, and automation and orchestration with Splunk.
Additionally, it covers cloud security with Splunk, DevOps, and security operations. Moreover, the book provides practical guidance on best practices for Splunk in cybersecurity, compliance, and regulatory requirements. It concludes with a summary of the key concepts covered throughout the book.
Table of Contents
1. Introduction to Splunk and Cybersecurity
2. Overview of Splunk Architecture
3. Configuring Inputs and Data Sources
4. Data Ingestion and Normalization
5. Understanding SIEM
6. Splunk Enterprise Security
7. Security Intelligence
8. Forensic Investigation in Security Domains
9. Splunk Integration with Other Security Tools
10. Splunk for Compliance and Regulatory Requirements
11. Security Orchestration, Automation and Response (SOAR) with Splunk
12. Cloud Security with Splunk
13. DevOps and Security Operations
14. Best Practices for Splunk in Cybersecurity
15. Conclusion and Summary
Index
Details
Erscheinungsjahr: | 2024 |
---|---|
Genre: | Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
ISBN-13: | 9788196815028 |
ISBN-10: | 8196815026 |
Sprache: | Englisch |
Ausstattung / Beilage: | Paperback |
Einband: | Kartoniert / Broschiert |
Autor: | Sinha, Jit |
Hersteller: | Orange Education Pvt Ltd |
Maße: | 235 x 191 x 23 mm |
Von/Mit: | Jit Sinha |
Erscheinungsdatum: | 06.01.2024 |
Gewicht: | 0,766 kg |
Details
Erscheinungsjahr: | 2024 |
---|---|
Genre: | Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
ISBN-13: | 9788196815028 |
ISBN-10: | 8196815026 |
Sprache: | Englisch |
Ausstattung / Beilage: | Paperback |
Einband: | Kartoniert / Broschiert |
Autor: | Sinha, Jit |
Hersteller: | Orange Education Pvt Ltd |
Maße: | 235 x 191 x 23 mm |
Von/Mit: | Jit Sinha |
Erscheinungsdatum: | 06.01.2024 |
Gewicht: | 0,766 kg |
Warnhinweis