Skip to Content
Security Operations Center: Building, Operating, and Maintaining your SOC
book

Security Operations Center: Building, Operating, and Maintaining your SOC

by Joseph Muniz, Gary McIntyre, Nadhem AlFardan
November 2015
Intermediate to advanced
375 pages
13h 43m
English
Cisco Press

Overview

Security Operations Center

Building, Operating, and Maintaining Your SOC

The complete, practical guide to planning, building, and operating an effective Security Operations Center (SOC)

Security Operations Center is the complete guide to building, operating, and managing Security Operations Centers in any environment. Drawing on experience with hundreds of customers ranging from Fortune 500 enterprises to large military organizations, three leading experts thoroughly review each SOC model, including virtual SOCs. You’ll learn how to select the right strategic option for your organization, and then plan and execute the strategy you’ve chosen.

Security Operations Center walks you through every phase required to establish and run an effective SOC, including all significant people, process, and technology capabilities. The authors assess SOC technologies, strategy, infrastructure, governance, planning, implementation, and more. They take a holistic approach considering various commercial and open-source tools found in modern SOCs.

This best-practice guide is written for anybody interested in learning how to develop, manage, or improve a SOC. A background in network security, management, and operations will be helpful but is not required. It is also an indispensable resource for anyone preparing for the Cisco SCYBER exam.

  • Review high-level issues, such as vulnerability and risk management, threat intelligence, digital investigation, and data collection/analysis

  • Understand the technical components of a modern SOC

  • Assess the current state of your SOC and identify areas of improvement

  • Plan SOC strategy, mission, functions, and services

  • Design and build out SOC infrastructure, from facilities and networks to systems, storage, and physical security

  • Collect and successfully analyze security data

  • Establish an effective vulnerability management practice

  • Organize incident response teams and measure their performance

  • Define an optimal governance and staffing model

  • Develop a practical SOC handbook that people can actually use

  • Prepare SOC to go live, with comprehensive transition plans

  • React quickly and collaboratively to security incidents

  • Implement best practice security operations, including continuous enhancement and improvement

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

Open-Source Security Operations Center (SOC)

Open-Source Security Operations Center (SOC)

Alfred Basta, Nadine Basta, Waqar Anwar, Mohammad Ilyas Essar
Applied Network Security Monitoring

Applied Network Security Monitoring

Chris Sanders, Jason Smith

Publisher Resources

ISBN: 9780134052083Purchase book