Defensive Cybersecurity & Ethical Hacking: Modern SOC Operations with SIEM, IDS/IPS, Splunk & Suricata
Format:
Paperback
En stock
0.78 kg
Sí
Nuevo
Amazon
USA
- Build, Defend, and Automate the SOC of the Future — Hands-On with Splunk, Suricata, SIEM, IDS/IPS, and Modern Defensive Security ToolsCybersecurity in 2025 demands more than firewalls and antivirus. Modern adversaries exploit misconfigurations, weak monitoring, and cloud-native gaps that overwhelm traditional defenses. The answer is a proactive, intelligence-driven Security Operations Center (SOC)—where SIEM, IDS/IPS, EDR, and SOAR work together to detect, contain, and eradicate attacks in real time.This book, Defensive Cybersecurity & Ethical Hacking, is your practical field guide to building and operating such a SOC. Unlike generic overviews, it delivers end-to-end, hands-on labs and projects—from log ingestion pipelines to incident playbooks—using real tools trusted by analysts worldwide: Splunk, Suricata, Security Onion, TheHive, Cortex, Shuffle, Sigma, YARA, AWS GuardDuty, Azure Sentinel, and GCP SCC.What You’ll Learn Inside✔ SOC & SIEM Fundamentals — Understand SOC tiers, defensive frameworks (NIST, MITRE ATT&CK, ISO 27001), and log pipelines that form the backbone of modern defense.✔ Splunk in Action — Ingest logs from Windows, Linux, and network devices, write SPL correlation rules, build dashboards, and integrate MITRE ATT&CK into detection.✔ Suricata IDS/IPS Mastery — Deploy Suricata, write and tune custom rules, analyze PCAPs, and correlate real traffic with Splunk and Security Onion.✔ Incident Response & Playbooks — Apply NIST 800-61 lifecycle, automate triage with SOAR (TheHive, Cortex, Shuffle), and build reusable playbooks for brute-force, phishing, malware, and lateral movement.✔ Advanced Defensive Practices — Explore EDR/XDR platforms (CrowdStrike, Defender, Wazuh), Zero Trust security models, and threat intelligence integration with MISP and OpenCTI.✔ Cloud SOC Readiness — Connect Splunk and SOAR with AWS GuardDuty, Azure Sentinel, and GCP SCC for hybrid, cloud-native security monitoring.✔ Full-Stack SOC Project — Deploy and operate a complete end-to-end SOC environment, collecting logs from endpoints, correlating alerts, and producing a professional incident report.✔ Career Roadmap — Build a SOC résumé, plan certifications (CEH, CySA+, Splunk, GCIA, OSCP Blue Team), and publish your homelab portfolio to stand out in a competitive field.Who This Book Is ForSOC Analysts & Blue Teamers — looking to sharpen detection, investigation, and incident response skills.Students & Career Changers — building homelabs and preparing for SOC or cybersecurity careers.Homelab Builders & Security Engineers — deploying Splunk, Suricata, and SOAR in test environments.Cybersecurity Professionals — expanding into detection engineering, threat hunting, and cloud SOC operations.Why This Book Stands Out100% hands-on labs and end-to-end projects, not just theory.Covers modern, enterprise-grade defensive tools: Splunk, Suricata, Security Onion, TheHive, Cortex, Sigma, YARA, GuardDuty, Sentinel, SCC.Aligned with real SOC workflows: log pipelines, rule tuning, alert correlation, incident reports.Integrates frameworks and automation (NIST, MITRE, Zero Trust, SOAR).Includes career development guidance: résumé templates, lab-to-portfolio mapping, and certification paths.Defensive Cybersecurity is no longer optional—it’s the front line of modern ethical hacking and digital resilience. This book gives you the tools, workflows, and confidence to master it.
IMPORT EASILY
By purchasing this product you can deduct VAT with your RUT number