Data Engineering for Cybersecurity: Build Secure Data Pipelines with Free and Open-Source Tools
By:
Sign Up Now!
Already a Member? Log In
You must be logged into Bookshare to access this title.
Learn about membership options,
or view our freely available titles.
- Synopsis
- Turn raw logs into real intelligence.Security teams rely on telemetry—the continuous stream of logs, events, metrics, and signals that reveal what&’s happening across systems, endpoints, and cloud services. But that data doesn&’t organize itself. It has to be collected, normalized, enriched, and secured before it becomes useful. That&’s where data engineering comes in.In this hands-on guide, cybersecurity engineer James Bonifield teaches you how to design and build scalable, secure data pipelines using free, open source tools such as Filebeat, Logstash, Redis, Kafka, and Elasticsearch and more. You&’ll learn how to collect telemetry from Windows including Sysmon and PowerShell events, Linux files and syslog, and streaming data from network and security appliances. You&’ll then transform it into structured formats, secure it in transit, and automate your deployments using Ansible.You&’ll also learn how to:Encrypt and secure data in transit using TLS and SSHCentrally manage code and configuration files using GitTransform messy logs into structured eventsEnrich data with threat intelligence using Redis and MemcachedStream and centralize data at scale with KafkaAutomate with Ansible for repeatable deploymentsWhether you&’re building a pipeline on a tight budget or deploying an enterprise-scale system, this book shows you how to centralize your security data, support real-time detection, and lay the groundwork for incident response and long-term forensics.
- Copyright:
- 2025
Book Details
- Book Quality:
- Publisher Quality
- Book Size:
- 344 Pages
- ISBN-13:
- 9781718504035
- Related ISBNs:
- 9781718504028
- Publisher:
- No Starch Press
- Date of Addition:
- 08/26/25
- Copyrighted By:
- James Bonifield.
- Adult content:
- No
- Language:
- English
- Has Image Descriptions:
- No
- Categories:
- Nonfiction, Computers and Internet
- Submitted By:
- Bookshare Staff
- Usage Restrictions:
- This is a copyrighted book.