Articoli correlati a Cybersecurity Attacks – Red Team Strategies:...

Cybersecurity Attacks – Red Team Strategies: A practical guide to building a penetration testing program having homefield advantage - Brossura

 
9781838828868: Cybersecurity Attacks – Red Team Strategies: A practical guide to building a penetration testing program having homefield advantage

Sinossi

Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantage

Key Features

  • Build, manage, and measure an offensive red team program
  • Leverage the homefield advantage to stay ahead of your adversaries
  • Understand core adversarial tactics and techniques, and protect pentesters and pentesting assets

Book Description

It's now more important than ever for organizations to be ready to detect and respond to security events and breaches. Preventive measures alone are not enough for dealing with adversaries. A well-rounded prevention, detection, and response program is required. This book will guide you through the stages of building a red team program, including strategies and homefield advantage opportunities to boost security.

The book starts by guiding you through establishing, managing, and measuring a red team program, including effective ways for sharing results and findings to raise awareness. Gradually, you'll learn about progressive operations such as cryptocurrency mining, focused privacy testing, targeting telemetry, and even blue team tooling. Later, you'll discover knowledge graphs and how to build them, then become well-versed with basic to advanced techniques related to hunting for credentials, and learn to automate Microsoft Office and browsers to your advantage. Finally, you'll get to grips with protecting assets using decoys, auditing, and alerting with examples for major operating systems.

By the end of this book, you'll have learned how to build, manage, and measure a red team program effectively and be well-versed with the fundamental operational techniques required to enhance your existing skills.

What you will learn

  • Understand the risks associated with security breaches
  • Implement strategies for building an effective penetration testing team
  • Map out the homefield using knowledge graphs
  • Hunt credentials using indexing and other practical techniques
  • Gain blue team tooling insights to enhance your red team skills
  • Communicate results and influence decision makers with appropriate data

Who this book is for

This is one of the few detailed cybersecurity books for penetration testers, cybersecurity analysts, security leaders and strategists, as well as red team members and chief information security officers (CISOs) looking to secure their organizations from adversaries. The program management part of this book will also be useful for beginners in the cybersecurity domain. To get the most out of this book, some penetration testing experience, and software engineering and debugging skills are necessary.

Table of Contents

  1. Establishing an Offensive Security Program
  2. Managing an Offensive Security Team
  3. Measuring an Offensive Security Program
  4. Progressive Red Team Operations
  5. Situational Awareness – Mapping Out the Homefield Using Graph Databases
  6. Building a Comprehensive Knowledge Graph
  7. Hunting for Credentials
  8. Advanced Credential Hunting
  9. Powerful Automation
  10. Protecting the Pen Tester
  11. Traps, Deceptions, and Honeypots
  12. Blue Team Tactics for the Red Team

Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.

Informazioni sull?autore

Johann Rehberger has over fifteen years of experience in threat analysis, threat modeling, risk management, penetration testing, and red teaming. As part of his many years at Microsoft, Johann established a penetration test team in Azure Data and led the program as Principal Security Engineering Manager. Recently, he built out a red team at Uber and currently works as an independent security and software engineer. Johann is well versed in analysis, design, implementation, and testing of software systems. Additionally, he enjoys providing training and was an instructor for ethical hacking at the University of Washington. Johann contributed to the MITRE ATT&CK framework and holds a master's in computer security from the University of Liverpool.

Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.

Compra usato

Condizioni: come nuovo
Unread book in perfect condition...
Visualizza questo articolo

EUR 17,08 per la spedizione da U.S.A. a Italia

Destinazione, tempi e costi

EUR 7,69 per la spedizione da U.S.A. a Italia

Destinazione, tempi e costi

Risultati della ricerca per Cybersecurity Attacks – Red Team Strategies:...

Foto dell'editore

Rehberger, Johann
Editore: Packt Publishing, 2020
ISBN 10: 1838828869 ISBN 13: 9781838828868
Nuovo Brossura

Da: California Books, Miami, FL, U.S.A.

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: New. Codice articolo I-9781838828868

Contatta il venditore

Compra nuovo

EUR 43,12
Convertire valuta
Spese di spedizione: EUR 7,69
Da: U.S.A. a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Foto dell'editore

Rehberger, Johann
Editore: Packt Publishing, 2020
ISBN 10: 1838828869 ISBN 13: 9781838828868
Nuovo Brossura

Da: Ria Christie Collections, Uxbridge, Regno Unito

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: New. In. Codice articolo ria9781838828868_new

Contatta il venditore

Compra nuovo

EUR 43,26
Convertire valuta
Spese di spedizione: EUR 10,41
Da: Regno Unito a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Immagini fornite dal venditore

Rehberger, Johann
ISBN 10: 1838828869 ISBN 13: 9781838828868
Nuovo Paperback or Softback

Da: BargainBookStores, Grand Rapids, MI, U.S.A.

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Paperback or Softback. Condizione: New. Cybersecurity Attacks - Red Team Strategies 1.96. Book. Codice articolo BBS-9781838828868

Contatta il venditore

Compra nuovo

EUR 42,82
Convertire valuta
Spese di spedizione: EUR 11,53
Da: U.S.A. a: Italia
Destinazione, tempi e costi

Quantità: 5 disponibili

Aggiungi al carrello

Immagini fornite dal venditore

Rehberger, Johann
Editore: Packt Publishing, 2020
ISBN 10: 1838828869 ISBN 13: 9781838828868
Nuovo Brossura

Da: GreatBookPrices, Columbia, MD, U.S.A.

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: New. Codice articolo 41186508-n

Contatta il venditore

Compra nuovo

EUR 39,77
Convertire valuta
Spese di spedizione: EUR 17,08
Da: U.S.A. a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Immagini fornite dal venditore

Rehberger, Johann
Editore: Packt Publishing, 2020
ISBN 10: 1838828869 ISBN 13: 9781838828868
Nuovo Brossura

Da: moluna, Greven, Germania

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: New. Cybersecurity Attacks: Red Team Strategies is a guide to building and maturing an internal red team program. It highlights the core strategies to measure and improve security awareness, breach detection, and response capabilities. In addition, we will dive . Codice articolo 448360860

Contatta il venditore

Compra nuovo

EUR 48,76
Convertire valuta
Spese di spedizione: EUR 9,70
Da: Germania a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Immagini fornite dal venditore

Johann Rehberger
ISBN 10: 1838828869 ISBN 13: 9781838828868
Nuovo Paperback

Da: Rarewaves.com UK, London, Regno Unito

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Paperback. Condizione: New. Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantageKey FeaturesBuild, manage, and measure an offensive red team programLeverage the homefield advantage to stay ahead of your adversariesUnderstand core adversarial tactics and techniques, and protect pentesters and pentesting assetsBook DescriptionIt's now more important than ever for organizations to be ready to detect and respond to security events and breaches. Preventive measures alone are not enough for dealing with adversaries. A well-rounded prevention, detection, and response program is required. This book will guide you through the stages of building a red team program, including strategies and homefield advantage opportunities to boost security.The book starts by guiding you through establishing, managing, and measuring a red team program, including effective ways for sharing results and findings to raise awareness. Gradually, you'll learn about progressive operations such as cryptocurrency mining, focused privacy testing, targeting telemetry, and even blue team tooling. Later, you'll discover knowledge graphs and how to build them, then become well-versed with basic to advanced techniques related to hunting for credentials, and learn to automate Microsoft Office and browsers to your advantage. Finally, you'll get to grips with protecting assets using decoys, auditing, and alerting with examples for major operating systems.By the end of this book, you'll have learned how to build, manage, and measure a red team program effectively and be well-versed with the fundamental operational techniques required to enhance your existing skills.What you will learnUnderstand the risks associated with security breachesImplement strategies for building an effective penetration testing teamMap out the homefield using knowledge graphsHunt credentials using indexing and other practical techniquesGain blue team tooling insights to enhance your red team skillsCommunicate results and influence decision makers with appropriate dataWho this book is forThis is one of the few detailed cybersecurity books for penetration testers, cybersecurity analysts, security leaders and strategists, as well as red team members and chief information security officers (CISOs) looking to secure their organizations from adversaries. The program management part of this book will also be useful for beginners in the cybersecurity domain. To get the most out of this book, some penetration testing experience, and software engineering and debugging skills are necessary. Codice articolo LU-9781838828868

Contatta il venditore

Compra nuovo

EUR 56,17
Convertire valuta
Spese di spedizione: EUR 2,32
Da: Regno Unito a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Immagini fornite dal venditore

Rehberger, Johann
Editore: Packt Publishing, 2020
ISBN 10: 1838828869 ISBN 13: 9781838828868
Nuovo Brossura

Da: GreatBookPricesUK, Woodford Green, Regno Unito

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: New. Codice articolo 41186508-n

Contatta il venditore

Compra nuovo

EUR 43,25
Convertire valuta
Spese di spedizione: EUR 17,37
Da: Regno Unito a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Immagini fornite dal venditore

Johann Rehberger
ISBN 10: 1838828869 ISBN 13: 9781838828868
Nuovo Paperback

Da: Rarewaves USA, OSWEGO, IL, U.S.A.

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Paperback. Condizione: New. Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantageKey FeaturesBuild, manage, and measure an offensive red team programLeverage the homefield advantage to stay ahead of your adversariesUnderstand core adversarial tactics and techniques, and protect pentesters and pentesting assetsBook DescriptionIt's now more important than ever for organizations to be ready to detect and respond to security events and breaches. Preventive measures alone are not enough for dealing with adversaries. A well-rounded prevention, detection, and response program is required. This book will guide you through the stages of building a red team program, including strategies and homefield advantage opportunities to boost security.The book starts by guiding you through establishing, managing, and measuring a red team program, including effective ways for sharing results and findings to raise awareness. Gradually, you'll learn about progressive operations such as cryptocurrency mining, focused privacy testing, targeting telemetry, and even blue team tooling. Later, you'll discover knowledge graphs and how to build them, then become well-versed with basic to advanced techniques related to hunting for credentials, and learn to automate Microsoft Office and browsers to your advantage. Finally, you'll get to grips with protecting assets using decoys, auditing, and alerting with examples for major operating systems.By the end of this book, you'll have learned how to build, manage, and measure a red team program effectively and be well-versed with the fundamental operational techniques required to enhance your existing skills.What you will learnUnderstand the risks associated with security breachesImplement strategies for building an effective penetration testing teamMap out the homefield using knowledge graphsHunt credentials using indexing and other practical techniquesGain blue team tooling insights to enhance your red team skillsCommunicate results and influence decision makers with appropriate dataWho this book is forThis is one of the few detailed cybersecurity books for penetration testers, cybersecurity analysts, security leaders and strategists, as well as red team members and chief information security officers (CISOs) looking to secure their organizations from adversaries. The program management part of this book will also be useful for beginners in the cybersecurity domain. To get the most out of this book, some penetration testing experience, and software engineering and debugging skills are necessary. Codice articolo LU-9781838828868

Contatta il venditore

Compra nuovo

EUR 57,48
Convertire valuta
Spese di spedizione: EUR 3,42
Da: U.S.A. a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Immagini fornite dal venditore

Rehberger, Johann
Editore: Packt Publishing, 2020
ISBN 10: 1838828869 ISBN 13: 9781838828868
Antico o usato Brossura

Da: GreatBookPrices, Columbia, MD, U.S.A.

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: As New. Unread book in perfect condition. Codice articolo 41186508

Contatta il venditore

Compra usato

EUR 43,90
Convertire valuta
Spese di spedizione: EUR 17,08
Da: U.S.A. a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Immagini fornite dal venditore

Johann Rehberger
ISBN 10: 1838828869 ISBN 13: 9781838828868
Nuovo Paperback

Da: Rarewaves USA United, OSWEGO, IL, U.S.A.

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Paperback. Condizione: New. Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantageKey FeaturesBuild, manage, and measure an offensive red team programLeverage the homefield advantage to stay ahead of your adversariesUnderstand core adversarial tactics and techniques, and protect pentesters and pentesting assetsBook DescriptionIt's now more important than ever for organizations to be ready to detect and respond to security events and breaches. Preventive measures alone are not enough for dealing with adversaries. A well-rounded prevention, detection, and response program is required. This book will guide you through the stages of building a red team program, including strategies and homefield advantage opportunities to boost security.The book starts by guiding you through establishing, managing, and measuring a red team program, including effective ways for sharing results and findings to raise awareness. Gradually, you'll learn about progressive operations such as cryptocurrency mining, focused privacy testing, targeting telemetry, and even blue team tooling. Later, you'll discover knowledge graphs and how to build them, then become well-versed with basic to advanced techniques related to hunting for credentials, and learn to automate Microsoft Office and browsers to your advantage. Finally, you'll get to grips with protecting assets using decoys, auditing, and alerting with examples for major operating systems.By the end of this book, you'll have learned how to build, manage, and measure a red team program effectively and be well-versed with the fundamental operational techniques required to enhance your existing skills.What you will learnUnderstand the risks associated with security breachesImplement strategies for building an effective penetration testing teamMap out the homefield using knowledge graphsHunt credentials using indexing and other practical techniquesGain blue team tooling insights to enhance your red team skillsCommunicate results and influence decision makers with appropriate dataWho this book is forThis is one of the few detailed cybersecurity books for penetration testers, cybersecurity analysts, security leaders and strategists, as well as red team members and chief information security officers (CISOs) looking to secure their organizations from adversaries. The program management part of this book will also be useful for beginners in the cybersecurity domain. To get the most out of this book, some penetration testing experience, and software engineering and debugging skills are necessary. Codice articolo LU-9781838828868

Contatta il venditore

Compra nuovo

EUR 59,21
Convertire valuta
Spese di spedizione: EUR 3,42
Da: U.S.A. a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Vedi altre 7 copie di questo libro

Vedi tutti i risultati per questo libro