Develop your red team skills by learning essential foundational
tactics, techniques, and procedures, and boost the overall security
posture of your organization by leveraging the homefield advantage
Key Features Build, manage, and measure an offensive red team
program Leverage the homefield advantage to stay ahead of your
adversaries Understand core adversarial tactics and techniques, and
protect pentesters and pentesting assets Book DescriptionIt's now
more important than ever for organizations to be ready to detect
and respond to security events and breaches. Preventive measures
alone are not enough for dealing with adversaries. A well-rounded
prevention, detection, and response program is required. This book
will guide you through the stages of building a red team program,
including strategies and homefield advantage opportunities to boost
security. The book starts by guiding you through establishing,
managing, and measuring a red team program, including effective
ways for sharing results and findings to raise awareness.
Gradually, you'll learn about progressive operations such as
cryptocurrency mining, focused privacy testing, targeting
telemetry, and even blue team tooling. Later, you'll discover
knowledge graphs and how to build them, then become well-versed
with basic to advanced techniques related to hunting for
credentials, and learn to automate Microsoft Office and browsers to
your advantage. Finally, you'll get to grips with protecting assets
using decoys, auditing, and alerting with examples for major
operating systems. By the end of this book, you'll have learned how
to build, manage, and measure a red team program effectively and be
well-versed with the fundamental operational techniques required to
enhance your existing skills. What you will learn Understand the
risks associated with security breaches Implement strategies for
building an effective penetration testing team Map out the
homefield using knowledge graphs Hunt credentials using indexing
and other practical techniques Gain blue team tooling insights to
enhance your red team skills Communicate results and influence
decision makers with appropriate data Who this book is forThis is
one of the few detailed cybersecurity books for penetration
testers, cybersecurity analysts, security leaders and strategists,
as well as red team members and chief information security officers
(CISOs) looking to secure their organizations from adversaries. The
program management part of this book will also be useful for
beginners in the cybersecurity domain. To get the most out of this
book, some penetration testing experience, and software engineering
and debugging skills are necessary.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!