Description |
1 online resource (208 p.) |
Note |
Description based upon print version of record. |
Bibliography |
Includes index. |
Summary |
This book will help you understand how a blue team is formed and why it is crucial for businesses. You'll learn different security controls, such as preventive and defensive controls, and become equipped to set up a blue team from scratch. |
Contents |
Part 1: Establishing the Blue -- Chapter 1: Establishing a Defense Program -- Chapter 2: Managing a Defense Security Team -- Chapter 3: Risk Assessment -- Chapter 4: Blue Team Operations -- Chapter 5: Threats -- What are cyber threats? -- Chapter 6: Governance, Compliance, Regulations, and Best Practices -- Part 2: Controlling the Fray -- Chapter 7: Preventive Controls -- Chapter 8: Detective Controls -- Chapter 9: Cyber Threat Intelligence -- Chapter 10: Incident Response and Recovery -- Chapter 11: Prioritizing and Implementing a Blue Team Strategy -- Part 3: Ask the Experts -- Chapter 12: Expert Insights. |
Note |
Corrective controls |
Subject |
Computer security.
|
|
Computer networks -- Security measures.
|
|
Computer crimes.
|
|
Sécurité informatique. |
|
Réseaux d'ordinateurs -- Sécurité -- Mesures. |
|
Criminalité informatique. |
|
Computer crimes |
|
Computer networks -- Security measures |
|
Computer security |
Added Author |
Thymianis, Nikolaos, author.
|
Other Form: |
Print version: Sehgal, Kunal Cybersecurity Blue Team Strategies Birmingham : Packt Publishing, Limited,c2023 9781801072472 |
ISBN |
9781801073615 |
|
1801073619 |
|
paperback |
|