CHAPTER 11
Data Analysis in Security Monitoring Activities
This chapter includes questions on the following topics:
• Best practices for security analytics using automated methods
• Techniques for basic manual analysis
• Applying the concept of “defense in depth” across the network
• Processes to continually improve your security operations
You can’t defend. You can’t prevent. The only thing you can do is detect and respond.
–Bruce Schneier
Analyzing security monitoring data is a huge endeavor and not for the faint of heart. Security analysts working in a security operations center (SOC) setting can quickly get inundated with thousands, tens of thousands, or hundreds of thousands of events from various sensors and security logs ...
Get CompTIA CySA+ Cybersecurity Analyst Certification Practice Exams (Exam CS0-002), 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.