Professional Red Teaming Professional Red Teaming

Professional Red Teaming

Conducting Successful Cybersecurity Engagements

    • 36,99 €
    • 36,99 €

Description de l’éditeur

Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools.

Professional Red Teaming introduces you to foundational offensive security concepts. The importance of assessments and ethical hacking is highlighted, and automated assessment technologies are addressed. The state of modern offensive security is discussed in terms of the unique challenges present in professional red teaming.

Best practices and operational tradecraft are covered so you feel comfortable in the shaping and carrying out of red team engagements. Anecdotes from actual operations and example scenarios illustrate key concepts and cement a practical understanding of the red team process.

You also are introduced to counter advanced persistent threat red teaming (CAPTR teaming). This is a reverse red teaming methodology aimed at specifically addressing the challenges faced from advanced persistent threats (APTs) by the organizations they target and the offensive security professionals trying to mitigate them.

What You’ll Learn:

Understand the challenges faced by offensive security assessmentsIncorporate or conduct red teaming to better mitigate cyber threatsInitiate a successful engagement
Get introduced to counter-APT red teaming (CAPTR)
Evaluate offensive security processes

GENRE
Informatique et Internet
SORTIE
2019
8 mars
LANGUE
EN
Anglais
LONGUEUR
229
Pages
ÉDITIONS
Apress
DÉTAILS DU FOURNISSEUR
Springer Science & Business Media LLC
TAILLE
27
Mo
CISO's Guide to Penetration Testing CISO's Guide to Penetration Testing
2016
Cybersecurity Incident Response Cybersecurity Incident Response
2018
Assessing Information Security Assessing Information Security
2015
Theoretical Cybersecurity Theoretical Cybersecurity
2022
Insider Attack and Cyber Security Insider Attack and Cyber Security
2008
Building Secure and Reliable Systems Building Secure and Reliable Systems
2020
Cybersecurity for Space Cybersecurity for Space
2024
The Business of Hacking The Business of Hacking
2024
Theoretical Cybersecurity Theoretical Cybersecurity
2022
Cybersecurity for Space Cybersecurity for Space
2020
Waging Cyber War Waging Cyber War
2019