Articles liés à Cybersecurity Attacks – Red Team Strategies:...

Cybersecurity Attacks – Red Team Strategies: A practical guide to building a penetration testing program having homefield advantage - Couverture souple

 
9781838828868: Cybersecurity Attacks – Red Team Strategies: A practical guide to building a penetration testing program having homefield advantage

Synopsis

Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantage

Key Features

  • Build, manage, and measure an offensive red team program
  • Leverage the homefield advantage to stay ahead of your adversaries
  • Understand core adversarial tactics and techniques, and protect pentesters and pentesting assets

Book Description

It's now more important than ever for organizations to be ready to detect and respond to security events and breaches. Preventive measures alone are not enough for dealing with adversaries. A well-rounded prevention, detection, and response program is required. This book will guide you through the stages of building a red team program, including strategies and homefield advantage opportunities to boost security.

The book starts by guiding you through establishing, managing, and measuring a red team program, including effective ways for sharing results and findings to raise awareness. Gradually, you'll learn about progressive operations such as cryptocurrency mining, focused privacy testing, targeting telemetry, and even blue team tooling. Later, you'll discover knowledge graphs and how to build them, then become well-versed with basic to advanced techniques related to hunting for credentials, and learn to automate Microsoft Office and browsers to your advantage. Finally, you'll get to grips with protecting assets using decoys, auditing, and alerting with examples for major operating systems.

By the end of this book, you'll have learned how to build, manage, and measure a red team program effectively and be well-versed with the fundamental operational techniques required to enhance your existing skills.

What you will learn

  • Understand the risks associated with security breaches
  • Implement strategies for building an effective penetration testing team
  • Map out the homefield using knowledge graphs
  • Hunt credentials using indexing and other practical techniques
  • Gain blue team tooling insights to enhance your red team skills
  • Communicate results and influence decision makers with appropriate data

Who this book is for

This is one of the few detailed cybersecurity books for penetration testers, cybersecurity analysts, security leaders and strategists, as well as red team members and chief information security officers (CISOs) looking to secure their organizations from adversaries. The program management part of this book will also be useful for beginners in the cybersecurity domain. To get the most out of this book, some penetration testing experience, and software engineering and debugging skills are necessary.

Table of Contents

  1. Establishing an Offensive Security Program
  2. Managing an Offensive Security Team
  3. Measuring an Offensive Security Program
  4. Progressive Red Team Operations
  5. Situational Awareness – Mapping Out the Homefield Using Graph Databases
  6. Building a Comprehensive Knowledge Graph
  7. Hunting for Credentials
  8. Advanced Credential Hunting
  9. Powerful Automation
  10. Protecting the Pen Tester
  11. Traps, Deceptions, and Honeypots
  12. Blue Team Tactics for the Red Team

Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.

À propos de l?auteur

Johann Rehberger has over fifteen years of experience in threat analysis, threat modeling, risk management, penetration testing, and red teaming. As part of his many years at Microsoft, Johann established a penetration test team in Azure Data and led the program as Principal Security Engineering Manager. Recently, he built out a red team at Uber and currently works as an independent security and software engineer. Johann is well versed in analysis, design, implementation, and testing of software systems. Additionally, he enjoys providing training and was an instructor for ethical hacking at the University of Washington. Johann contributed to the MITRE ATT&CK framework and holds a master's in computer security from the University of Liverpool.

Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.

Acheter D'occasion

état :  Comme neuf
Unread book in perfect condition...
Afficher cet article
EUR 43,82

Autre devise

EUR 17,05 expédition depuis Etats-Unis vers France

Destinations, frais et délais

Acheter neuf

Afficher cet article
EUR 43,08

Autre devise

EUR 4,60 expédition depuis Royaume-Uni vers France

Destinations, frais et délais

Résultats de recherche pour Cybersecurity Attacks – Red Team Strategies:...

Image d'archives

Rehberger, Johann
Edité par Packt Publishing, 2020
ISBN 10 : 1838828869 ISBN 13 : 9781838828868
Neuf Couverture souple

Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : New. In. N° de réf. du vendeur ria9781838828868_new

Contacter le vendeur

Acheter neuf

EUR 43,08
Autre devise
Frais de port : EUR 4,60
De Royaume-Uni vers France
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image d'archives

Rehberger, Johann
Edité par Packt Publishing, 2020
ISBN 10 : 1838828869 ISBN 13 : 9781838828868
Neuf Couverture souple

Vendeur : California Books, Miami, FL, Etats-Unis

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : New. N° de réf. du vendeur I-9781838828868

Contacter le vendeur

Acheter neuf

EUR 43,05
Autre devise
Frais de port : EUR 6,82
De Etats-Unis vers France
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image fournie par le vendeur

Rehberger, Johann
Edité par Packt Publishing 3/31/2020, 2020
ISBN 10 : 1838828869 ISBN 13 : 9781838828868
Neuf Paperback or Softback

Vendeur : BargainBookStores, Grand Rapids, MI, Etats-Unis

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Paperback or Softback. Etat : New. Cybersecurity Attacks - Red Team Strategies 1.96. Book. N° de réf. du vendeur BBS-9781838828868

Contacter le vendeur

Acheter neuf

EUR 42,75
Autre devise
Frais de port : EUR 10,66
De Etats-Unis vers France
Destinations, frais et délais

Quantité disponible : 5 disponible(s)

Ajouter au panier

Image fournie par le vendeur

Rehberger, Johann
Edité par Packt Publishing, 2020
ISBN 10 : 1838828869 ISBN 13 : 9781838828868
Neuf Couverture souple

Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : New. N° de réf. du vendeur 41186508-n

Contacter le vendeur

Acheter neuf

EUR 39,70
Autre devise
Frais de port : EUR 17,05
De Etats-Unis vers France
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image fournie par le vendeur

Johann Rehberger
Edité par Packt Publishing Limited, GB, 2020
ISBN 10 : 1838828869 ISBN 13 : 9781838828868
Neuf Paperback

Vendeur : Rarewaves.com UK, London, Royaume-Uni

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Paperback. Etat : New. Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantageKey FeaturesBuild, manage, and measure an offensive red team programLeverage the homefield advantage to stay ahead of your adversariesUnderstand core adversarial tactics and techniques, and protect pentesters and pentesting assetsBook DescriptionIt's now more important than ever for organizations to be ready to detect and respond to security events and breaches. Preventive measures alone are not enough for dealing with adversaries. A well-rounded prevention, detection, and response program is required. This book will guide you through the stages of building a red team program, including strategies and homefield advantage opportunities to boost security.The book starts by guiding you through establishing, managing, and measuring a red team program, including effective ways for sharing results and findings to raise awareness. Gradually, you'll learn about progressive operations such as cryptocurrency mining, focused privacy testing, targeting telemetry, and even blue team tooling. Later, you'll discover knowledge graphs and how to build them, then become well-versed with basic to advanced techniques related to hunting for credentials, and learn to automate Microsoft Office and browsers to your advantage. Finally, you'll get to grips with protecting assets using decoys, auditing, and alerting with examples for major operating systems.By the end of this book, you'll have learned how to build, manage, and measure a red team program effectively and be well-versed with the fundamental operational techniques required to enhance your existing skills.What you will learnUnderstand the risks associated with security breachesImplement strategies for building an effective penetration testing teamMap out the homefield using knowledge graphsHunt credentials using indexing and other practical techniquesGain blue team tooling insights to enhance your red team skillsCommunicate results and influence decision makers with appropriate dataWho this book is forThis is one of the few detailed cybersecurity books for penetration testers, cybersecurity analysts, security leaders and strategists, as well as red team members and chief information security officers (CISOs) looking to secure their organizations from adversaries. The program management part of this book will also be useful for beginners in the cybersecurity domain. To get the most out of this book, some penetration testing experience, and software engineering and debugging skills are necessary. N° de réf. du vendeur LU-9781838828868

Contacter le vendeur

Acheter neuf

EUR 55,95
Autre devise
Frais de port : EUR 2,31
De Royaume-Uni vers France
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image fournie par le vendeur

Rehberger, Johann
Edité par Packt Publishing, 2020
ISBN 10 : 1838828869 ISBN 13 : 9781838828868
Neuf Couverture souple

Vendeur : moluna, Greven, Allemagne

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : New. Cybersecurity Attacks: Red Team Strategies is a guide to building and maturing an internal red team program. It highlights the core strategies to measure and improve security awareness, breach detection, and response capabilities. In addition, we will dive . N° de réf. du vendeur 448360860

Contacter le vendeur

Acheter neuf

EUR 48,76
Autre devise
Frais de port : EUR 9,70
De Allemagne vers France
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image fournie par le vendeur

Rehberger, Johann
Edité par Packt Publishing, 2020
ISBN 10 : 1838828869 ISBN 13 : 9781838828868
Neuf Couverture souple

Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : New. N° de réf. du vendeur 41186508-n

Contacter le vendeur

Acheter neuf

EUR 43,07
Autre devise
Frais de port : EUR 17,30
De Royaume-Uni vers France
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image d'archives

Johann Rehberger
Edité par Packt Publishing Limited, 2020
ISBN 10 : 1838828869 ISBN 13 : 9781838828868
Neuf Paperback / softback
impression à la demande

Vendeur : THE SAINT BOOKSTORE, Southport, Royaume-Uni

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Paperback / softback. Etat : New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 1108. N° de réf. du vendeur C9781838828868

Contacter le vendeur

Acheter neuf

EUR 49,38
Autre devise
Frais de port : EUR 11,13
De Royaume-Uni vers France
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image fournie par le vendeur

Johann Rehberger
Edité par Packt Publishing Limited, GB, 2020
ISBN 10 : 1838828869 ISBN 13 : 9781838828868
Neuf Paperback

Vendeur : Rarewaves USA, OSWEGO, IL, Etats-Unis

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Paperback. Etat : New. Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantageKey FeaturesBuild, manage, and measure an offensive red team programLeverage the homefield advantage to stay ahead of your adversariesUnderstand core adversarial tactics and techniques, and protect pentesters and pentesting assetsBook DescriptionIt's now more important than ever for organizations to be ready to detect and respond to security events and breaches. Preventive measures alone are not enough for dealing with adversaries. A well-rounded prevention, detection, and response program is required. This book will guide you through the stages of building a red team program, including strategies and homefield advantage opportunities to boost security.The book starts by guiding you through establishing, managing, and measuring a red team program, including effective ways for sharing results and findings to raise awareness. Gradually, you'll learn about progressive operations such as cryptocurrency mining, focused privacy testing, targeting telemetry, and even blue team tooling. Later, you'll discover knowledge graphs and how to build them, then become well-versed with basic to advanced techniques related to hunting for credentials, and learn to automate Microsoft Office and browsers to your advantage. Finally, you'll get to grips with protecting assets using decoys, auditing, and alerting with examples for major operating systems.By the end of this book, you'll have learned how to build, manage, and measure a red team program effectively and be well-versed with the fundamental operational techniques required to enhance your existing skills.What you will learnUnderstand the risks associated with security breachesImplement strategies for building an effective penetration testing teamMap out the homefield using knowledge graphsHunt credentials using indexing and other practical techniquesGain blue team tooling insights to enhance your red team skillsCommunicate results and influence decision makers with appropriate dataWho this book is forThis is one of the few detailed cybersecurity books for penetration testers, cybersecurity analysts, security leaders and strategists, as well as red team members and chief information security officers (CISOs) looking to secure their organizations from adversaries. The program management part of this book will also be useful for beginners in the cybersecurity domain. To get the most out of this book, some penetration testing experience, and software engineering and debugging skills are necessary. N° de réf. du vendeur LU-9781838828868

Contacter le vendeur

Acheter neuf

EUR 57,38
Autre devise
Frais de port : EUR 3,41
De Etats-Unis vers France
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image fournie par le vendeur

Rehberger, Johann
Edité par Packt Publishing, 2020
ISBN 10 : 1838828869 ISBN 13 : 9781838828868
Ancien ou d'occasion Couverture souple

Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 41186508

Contacter le vendeur

Acheter D'occasion

EUR 43,82
Autre devise
Frais de port : EUR 17,05
De Etats-Unis vers France
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

There are 7 autres exemplaires de ce livre sont disponibles

Afficher tous les résultats pour ce livre