Professional Red Teaming Conducting Successful Cybersecurity Engagements /

Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scri...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Oakley, Jacob G. (Συγγραφέας, http://id.loc.gov/vocabulary/relators/aut)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berkeley, CA : Apress : Imprint: Apress, 2019.
Έκδοση:1st ed. 2019.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03553nam a2200421 4500
001 978-1-4842-4309-1
003 DE-He213
005 20190618041821.0
007 cr nn 008mamaa
008 190308s2019 xxu| s |||| 0|eng d
020 |a 9781484243091  |9 978-1-4842-4309-1 
024 7 |a 10.1007/978-1-4842-4309-1  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
082 0 4 |a 005.8  |2 23 
100 1 |a Oakley, Jacob G.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Professional Red Teaming  |h [electronic resource] :  |b Conducting Successful Cybersecurity Engagements /  |c by Jacob G. Oakley. 
250 |a 1st ed. 2019. 
264 1 |a Berkeley, CA :  |b Apress :  |b Imprint: Apress,  |c 2019. 
300 |a XIX, 210 p. 46 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Chapter 1: Red Teams in Cyberspace -- Chapter 2: Why Human Hackers? -- Chapter 3: The State of Modern Offensive Security -- Chapter 4: Shaping -- Chapter 5: Rules of Engagement -- Chapter 6: Executing -- Chapter 7: Reporting -- Chapter 8: Purple Teaming -- Chapter 9: Counter-APT Red Teaming -- Chapter 10: Outcome Oriented Scoping -- Chapter 11: Initialization Perspectives -- Chapter 12: Reverse Red Teaming -- Chapter 13: Evaluating Offensive Security Processes -- Chapter 14: Experimentation -- Chapter 15: Validation.-. 
520 |a Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools. Professional Red Teaming introduces you to foundational offensive security concepts. The importance of assessments and ethical hacking is highlighted, and automated assessment technologies are addressed. The state of modern offensive security is discussed in terms of the unique challenges present in professional red teaming. Best practices and operational tradecraft are covered so you feel comfortable in the shaping and carrying out of red team engagements. Anecdotes from actual operations and example scenarios illustrate key concepts and cement a practical understanding of the red team process. You also are introduced to counter advanced persistent threat red teaming (CAPTR teaming). This is a reverse red teaming methodology aimed at specifically addressing the challenges faced from advanced persistent threats (APTs) by the organizations they target and the offensive security professionals trying to mitigate them. What You'll Learn: Understand the challenges faced by offensive security assessments Incorporate or conduct red teaming to better mitigate cyber threats Initiate a successful engagement Get introduced to counter-APT red teaming (CAPTR) Evaluate offensive security processes. 
650 0 |a Data protection. 
650 1 4 |a Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28000 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9781484243084 
776 0 8 |i Printed edition:  |z 9781484243107 
856 4 0 |u https://doi.org/10.1007/978-1-4842-4309-1  |z Full Text via HEAL-Link 
912 |a ZDB-2-CWD 
950 |a Professional and Applied Computing (Springer-12059)