Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Start tilbuddet
DK - Details page - Device banner - 894x1036

Cybersecurity Attacks – Red Team Strategies: A practical guide to building a penetration testing program having homefield advantage

Sprog
Engelsk
Format
Kategori

Fakta

Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantage

Key Features

• Build, manage, and measure an offensive red team program

• Leverage the homefield advantage to stay ahead of your adversaries

• Understand core adversarial tactics and techniques, and protect pentesters and pentesting assets

Book Description

It's now more important than ever for organizations to be ready to detect and respond to security events and breaches. Preventive measures alone are not enough for dealing with adversaries. A well-rounded prevention, detection, and response program is required. This book will guide you through the stages of building a red team program, including strategies and homefield advantage opportunities to boost security.

The book starts by guiding you through establishing, managing, and measuring a red team program, including effective ways for sharing results and findings to raise awareness. Gradually, you'll learn about progressive operations such as cryptocurrency mining, focused privacy testing, targeting telemetry, and even blue team tooling. Later, you'll discover knowledge graphs and how to build them, then become well-versed with basic to advanced techniques related to hunting for credentials, and learn to automate Microsoft Office and browsers to your advantage. Finally, you'll get to grips with protecting assets using decoys, auditing, and alerting with examples for major operating systems.

By the end of this book, you'll have learned how to build, manage, and measure a red team program effectively and be well-versed with the fundamental operational techniques required to enhance your existing skills.

What you will learn

• Understand the risks associated with security breaches

• Implement strategies for building an effective penetration testing team

• Map out the homefield using knowledge graphs

• Hunt credentials using indexing and other practical techniques

• Gain blue team tooling insights to enhance your red team skills

• Communicate results and influence decision makers with appropriate data

Who this book is for

This is one of the few detailed cybersecurity books for penetration testers, cybersecurity analysts, security leaders and strategists, as well as red team members and chief information security officers (CISOs) looking to secure their organizations from adversaries. The program management part of this book will also be useful for beginners in the cybersecurity domain. To get the most out of this book, some penetration testing experience, and software engineering and debugging skills are necessary.

© 2020 Packt Publishing (E-bog): 9781838825508

Release date

E-bog: 31. marts 2020

Andre kan også lide...

  1. Learn Azure Sentinel: Integrate Azure security with artificial intelligence to build secure cloud systems Gary Bushey
  2. Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs Mostafa Yahia
  3. Security Orchestration, Automation, and Response for Security Analysts: Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture Benjamin Kovacevic
  4. Hands-On Web Penetration Testing with Metasploit: The subtle art of using Metasploit 5.0 for web application exploitation Harpreet Singh
  5. Penetration Testing Azure for Ethical Hackers: Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments David Okeyode
  6. Incident Response with Threat Intelligence: Practical insights into developing an incident response capability through intelligence-based threat hunting Roberto Martinez
  7. Practical Threat Detection Engineering: A hands-on guide to planning, developing, and validating detection capabilities Jason Deyalsingh
  8. The Art of Social Engineering: Uncover the secrets behind the human dynamics in cybersecurity Cesar Bravo
  9. Microsoft Azure Security Technologies Certification and Beyond: Gain practical skills to secure your Azure environment and pass the AZ-500 exam David Okeyode
  10. Attacking and Exploiting Modern Web Applications: Discover the mindset, techniques, and tools to perform modern web attacks and exploitation Simone Onofri
  11. Ghidra Software Reverse-Engineering for Beginners: Master the art of debugging, from understanding code to mitigating threats David Álvarez Pérez
  12. The Vulnerability Researcher's Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities Benjamin Strout
  13. Cloud Penetration Testing: Learn how to effectively pentest AWS, Azure, and GCP applications Kim Crawley
  14. Hands-On AWS Penetration Testing with Kali Linux: Set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormation Karl Gilbert
  15. Antivirus Bypass Techniques: Learn practical techniques and tactics to combat, bypass, and evade antivirus software Uriel Kosayev
  16. Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide: Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and ebook. Lee Allen
  17. Cloud Security Handbook: Find out how to effectively secure cloud environments using AWS, Azure, and GCP Eyal Estrin
  18. Hack the Cybersecurity Interview: Navigate Cybersecurity Interviews with Confidence, from Entry-level to Expert roles Ken Underhill
  19. Network Vulnerability Assessment: Identify security loopholes in your network's infrastructure Sagar Rahalkar
  20. Critical Infrastructure Security: Cybersecurity lessons learned from real-world breaches Soledad Antelada Toledano
  21. Microsoft Defender for Cloud Cookbook: Protect multicloud and hybrid cloud environments, manage compliance and strengthen security posture Sasha Kranjac
  22. Blockchain and Decentralized Applications: Empowering a Transparent, Secure, and Decentralized Future Saimon Carrie
  23. Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents Wilson Bautista
  24. Improving your Penetration Testing Skills: Strengthen your defense against web attacks with Kali Linux and Metasploit Gilberto Najera-Gutierrez
  25. Learn Red - Fundamentals of Red : Get up and running with the Red language for full-stack development: Get up and running with the Red language for full-stack development Ivo Balbaert
  26. Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers Chiheb Chebbi
  27. Cybersecurity and Privacy Law Handbook: A beginner's guide to dealing with privacy and security while keeping hackers at bay Walter Rocchi
  28. Cybersecurity Architect's Handbook: An end-to-end guide to implementing and maintaining robust security architecture Lester Nichols
  29. Practical Industrial Internet of Things Security: A practitioner's guide to securing connected industries Sravani Bhattacharjee
  30. Machine Learning for Cybersecurity Cookbook: Over 80 recipes on how to implement machine learning algorithms for building security systems using Python Emmanuel Tsukerman
  31. Underground Cities: Mapping the tunnels, transits and networks underneath our feet Mark Ovenden
  32. Imagine That - Football: The History of Football Rewritten Michael Sells
  33. Shinto and the State, 1868-1988 Helen Hardacre
  34. Brain Gain: Technology and the Quest for Digital Wisdom Marc Prensky
  35. Surviving Technopolis: Essays on Finding Balance in Our New Man-Made Environments Arthur W. Hunt III
  36. The Future of Us: The Science of What We'll Eat, Where We'll Live, and Who We'll Be Jay Ingram
  37. Not Working: Where Have All the Good Jobs Gone? David G. Blanchflower
  38. Igniting the Invisible Tribe: Designing An Organization That Doesn't Suck Josh Allan Dykstra
  39. The Mind of the Market: How Biology and Psychology Shape Our Economic Lives Michael Shermer
  40. The Bitcoin Big Bang: How Alternative Currencies Are About to Change the World Brian Kelly

Vælg dit abonnement

  • Over 600.000 titler

  • Download og nyd titler offline

  • Eksklusive titler + Mofibo Originals

  • Børnevenligt miljø (Kids Mode)

  • Det er nemt at opsige når som helst

Flex

For dig som vil prøve Mofibo.

89 kr. /måned
  • 1 konto

  • 20 timer/måned

  • Gem op til 100 ubrugte timer

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Prøv gratis
Den mest populære

Premium

For dig som lytter og læser ofte.

129 kr. /måned
  • 1 konto

  • 100 timer/måned

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Unlimited

For dig som lytter og læser ubegrænset.

149 kr. /måned
  • 1 konto

  • Ubegrænset adgang

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Family

For dig som ønsker at dele historier med familien.

Fra 179 kr. /måned
  • 2-6 konti

  • 100 timer/måned pr. konto

  • Fri lytning til podcasts

  • Kun 39 kr. pr. ekstra konto

  • Ingen binding

2 konti

179 kr. /måned
Start tilbuddet