Chapter 14: Hunting and Investigating Security Incidents
This is the last chapter of the book; it has been an exciting journey and you have learned some new things. In this chapter, you can put into practice your knowledge by working on a practical case of a security incident.
Unlike the previous chapters, you will do most of the work, and you will be able to follow incident response (IR) procedures, organize activities in the incident management (IM) platform, and use different tools for hunting and investigation.
In this chapter, you will learn about the following topics:
- Responding to a data breach incident
- Opening a new IR case
- Investigating the security incident
Technical requirements
In case you haven't already, you need to download ...
Get Incident Response with Threat Intelligence now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.