Endpoint Detection and Response Essentials Explore the Landscape of Hacking, Defense, and Deployment in EDR
Description
More Details
Notes
Table of Contents
Reviews from GoodReads
Citations
Boyraz, G. (2024). Endpoint Detection and Response Essentials: Explore the Landscape of Hacking, Defense, and Deployment in EDR (1st edition.). Packt Publishing, Limited.
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)Boyraz, Guven. 2024. Endpoint Detection and Response Essentials: Explore the Landscape of Hacking, Defense, and Deployment in EDR. Birmingham: Packt Publishing, Limited.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Boyraz, Guven. Endpoint Detection and Response Essentials: Explore the Landscape of Hacking, Defense, and Deployment in EDR Birmingham: Packt Publishing, Limited, 2024.
Harvard Citation (style guide)Boyraz, G. (2024). Endpoint detection and response essentials: explore the landscape of hacking, defense, and deployment in EDR. 1st edn. Birmingham: Packt Publishing, Limited.
MLA Citation, 9th Edition (style guide)Boyraz, Guven. Endpoint Detection and Response Essentials: Explore the Landscape of Hacking, Defense, and Deployment in EDR 1st edition., Packt Publishing, Limited, 2024.
Staff View
Grouping Information
Grouped Work ID | c2e697d9-b81c-3a24-c153-41a13553a24f-eng |
---|---|
Full title | endpoint detection and response essentials explore the landscape of hacking defense and deployment in edr |
Author | boyraz guven |
Grouping Category | book |
Last Update | 2025-01-24 12:33:29PM |
Last Indexed | 2025-05-22 03:36:51AM |
Book Cover Information
Image Source | default |
---|---|
First Loaded | Dec 25, 2024 |
Last Used | Jan 20, 2025 |
Marc Record
First Detected | Dec 16, 2024 11:30:09 PM |
---|---|
Last File Modification Time | Dec 17, 2024 08:29:18 AM |
Suppressed | Record had no items |
MARC Record
LEADER | 07777cam a22006017a 4500 | ||
---|---|---|---|
001 | on1432589759 | ||
003 | OCoLC | ||
005 | 20241217082721.0 | ||
006 | m o d | ||
007 | cr cnu|||||||| | ||
008 | 240511s2024 enk o 000 0 eng d | ||
019 | |a 1432583344|a 1437891116 | ||
020 | |a 9781835465769 | ||
020 | |a 1835465765 | ||
035 | |a (OCoLC)1432589759|z (OCoLC)1432583344|z (OCoLC)1437891116 | ||
037 | |a 9781835463260|b O'Reilly Media | ||
037 | |a 10540166|b IEEE | ||
040 | |a EBLCP|b eng|c EBLCP|d YDX|d ORMDA|d N$T|d IEEEE|d UKAHL | ||
049 | |a MAIN | ||
050 | 4 | |a QA76.9.A25 | |
082 | 0 | 4 | |a 005.8|2 23/eng/20240604 |
100 | 1 | |a Boyraz, Guven,|e author. | |
245 | 1 | 0 | |a Endpoint Detection and Response Essentials|h [electronic resource] :|b Explore the Landscape of Hacking, Defense, and Deployment in EDR /|c Guven Boyraz. |
250 | |a 1st edition. | ||
260 | |a Birmingham :|b Packt Publishing, Limited,|c 2024. | ||
300 | |a 1 online resource (171 p.) | ||
336 | |a text|b txt|2 rdacontent | ||
337 | |a computer|b c|2 rdamedia | ||
338 | |a online resource|b cr|2 rdacarrier | ||
500 | |a Description based upon print version of record. | ||
500 | |a Example use cases | ||
505 | 0 | |a Cover -- Copyright -- Contributors -- About the reviewers -- Table of Contents -- Preface -- Part 1: The Fundamentals of Endpoint Security and EDR -- Chapter 1: Introducing Endpoint Security and EDR -- An overview of modern cybersecurity threats and challenges -- Importance of endpoint security in modern IT environments -- EDR tools versus traditional anti-virus -- navigating the new world of endpoint security -- Evolution of EDR technologies -- Summary -- Chapter 2: EDR Architecture and Its Key Components -- Definition and core concepts of EDR -- Endpoints | |
505 | 8 | |a Endpoint visibility (monitoring) -- Detection -- Response -- EDR architecture -- Key features and capabilities of EDR tools -- An overview of popular EDR tools -- Microsoft Defender for Endpoint -- SentinelOne -- CrowdStrike Falcon Insight -- Summary -- Chapter 3: EDR Implementation and Deployment -- The planning and considerations before deploying EDR and deployment models -- On-premises EDR -- Cloud-based EDR -- Hybrid EDR -- Lab experiment -- hands-on deployment of SentinelOne Singularity EDR/XDR -- Use cases -- Use case 1 -- Use case 2 -- Use case 3 -- Summary | |
505 | 8 | |a Part 2: Advanced Endpoint Security Techniques and Best Practices -- Chapter 4: Unlocking Synergy -- EDR Use Cases and ChatGPT Integration -- DFIR life cycle -- Use case 1 -- identifying the source and root cause of data leakage in the cyber incidents -- Objective -- Background -- Integration process -- Analysis and correlation -- Benefits -- Conclusion -- Use case 2 -- endpoint management with EDR -- Objectives -- Policy definition and deployment -- Benefits -- Conclusion -- Use case 3 -- safeguarding your company against WannaCry using EDR -- Background -- Incident timeline | |
505 | 8 | |a Outcomes and lessons learned -- Use case 4 -- email security -- Use case 5 -- ransomware incident -- Use case 6 -- man-in-the-middle attack -- Summary -- Chapter 5: Navigating the Digital Shadows -- EDR Hacking Techniques -- The foundation of the evasion life cycle -- Function hooking DLLs and how to evade them with In/DirectSyscalls -- Event Tracing for Windows (ETW) and how to evade it -- Patching -- Configuration modification -- Living off the Land (LOTL) techniques -- Microsoft's unwitting role -- Use of kernel-land software (aka the driver method) -- Summary | |
505 | 8 | |a Chapter 6: Best Practices and Recommendations for Endpoint Protection -- Endpoint hardening -- Network segmentation -- Inventory and asset discovery -- Using a VPN -- Using MFA -- Closing the USB ports -- Automated updates -- Implementing endpoint encryption -- Regularly assessing and auditing endpoints -- Imposing least privileges and access controls -- Automatic screen lock -- Managing your passwords -- Roaming clients -- Summary -- Part 3: Future Trends and Strategies in Endpoint Security -- Chapter 7: How DNS Logs Can Help You to Defend Your Endpoints -- DNS protocol and enrichment | |
520 | |a Elevate your expertise in endpoint detection and response by mastering advanced EDR/XDR concepts through real-life examples and fortify your organization's cyber defense strategy Key Features Learn how to tackle endpoint security problems in your organization Apply practical guidance and real-world examples to harden endpoint security Implement EDR/XDR tools for optimal protection of digital assets Purchase of the print or Kindle book includes a free PDF eBook Book Description In this data-driven age, safeguarding sensitive data and privacy has become paramount, demanding a deep understanding of the intricacies of cyberspace and its associated threats. With a focus on endpoint defense, Endpoint Detection and Response Essentials guides you in implementing EDR solutions to stay ahead of attackers and ensure the overall security posture of your IT infrastructure. Starting with an insightful introduction to EDR and its significance in the modern cyber threat landscape, this book offers a quick overview of popular EDR tools followed by their practical implementation. From real-world case studies, best practices, and deployment strategies to maximizing the effectiveness of EDR, including endpoint hardening techniques and advanced DNS visibility methods, this comprehensive resource equips you with the knowledge and hands-on skills to strengthen your organization's defense against cyber attacks. Recognizing the role of the DNS protocol, you'll fortify your organization's endpoint defense proactively. By the end of this book, you'll have honed the skills needed to construct a resilient cybersecurity defense for yourself and your organization. What you will learn Gain insight into current cybersecurity threats targeting endpoints Understand why antivirus solutions are no longer sufficient for robust security Explore popular EDR/XDR tools and their implementation Master the integration of EDR tools into your security operations Uncover evasion techniques employed by hackers in the EDR/XDR context Get hands-on experience utilizing DNS logs for endpoint defense Apply effective endpoint hardening techniques within your organization Who this book is for If you're an IT professional seeking to safeguard yourself and your company's digital assets, this book is for you. To make the most of its content, a foundational understanding of GNU/Linux, operating systems, networks, and programming concepts is recommended. Additionally, security professionals eager to delve into advanced endpoint defense techniques will find this book invaluable. | ||
590 | |a O'Reilly|b O'Reilly Online Learning: Academic/Public Library Edition | ||
630 | 0 | 0 | |a Microsoft Windows (Computer file)|9 15379 |
650 | 0 | |a Penetration testing (Computer security)|9 403748 | |
650 | 0 | |a Intrusion detection systems (Computer security) | |
650 | 0 | |a Computer security|x Computer programs. | |
650 | 0 | |a Computer networks|x Security measures|x Data processing. | |
650 | 0 | |a Operating systems (Computers)|x Protection. | |
776 | 0 | 8 | |i Print version:|a Boyraz, Guven|t Endpoint Detection and Response Essentials|d Birmingham : Packt Publishing, Limited,c2024 |
856 | 4 | 0 | |u https://library.access.arlingtonva.us/login?url=https://learning.oreilly.com/library/view/~/9781835463260/?ar|x O'Reilly|z eBook |
938 | |a Askews and Holts Library Services|b ASKH|n AH42123123 | ||
938 | |a ProQuest Ebook Central|b EBLB|n EBL31310951 | ||
938 | |a ProQuest Ebook Central|b EBLB|n EBL31310951 | ||
938 | |a YBP Library Services|b YANK|n 21015633 | ||
938 | |a EBSCOhost|b EBSC|n 3885815 | ||
994 | |a 92|b VIA | ||
999 | |c 360863|d 360863 |