This book will offer relevant AI training to existing cybersecurity professionals as well as to students in cybersecurity programs at university level.
The current structure of the book is as follows:
- AI Concepts and Algorithms
- Security Frameworks that enterprises use such as ISO 27001/2, NIST CSF, FISMA
- Research conducted by OWASP and MITRE ( Particularly ATT&CK and D3F3ND Frameworks)
- Security Incidence and Response Playbooks using CISA's Federal Government Cybersecurity Incident and Vulnerability Response Playbooks as examples.
- Security operations best practices based on concepts from items 2,3 and 4 above.
- Academic papers that describe general AI techniques applied towards security operations.
- Vendor agnostic assessment of what technologies are available in the market today and how they help with security operations.
- Consideration of hard problems in security operations and ideas for further innovation.