Professional Red Teaming Conducting Successful Cybersecurity Engagements /

Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scri...

Full description

Bibliographic Details
Main Author: Oakley, Jacob G. (Author, http://id.loc.gov/vocabulary/relators/aut)
Corporate Author: SpringerLink (Online service)
Format: Electronic eBook
Language:English
Published: Berkeley, CA : Apress : Imprint: Apress, 2019.
Edition:1st ed. 2019.
Subjects:
Online Access:Full Text via HEAL-Link
Table of Contents:
  • Chapter 1: Red Teams in Cyberspace
  • Chapter 2: Why Human Hackers?
  • Chapter 3: The State of Modern Offensive Security
  • Chapter 4: Shaping
  • Chapter 5: Rules of Engagement
  • Chapter 6: Executing
  • Chapter 7: Reporting
  • Chapter 8: Purple Teaming
  • Chapter 9: Counter-APT Red Teaming
  • Chapter 10: Outcome Oriented Scoping
  • Chapter 11: Initialization Perspectives
  • Chapter 12: Reverse Red Teaming
  • Chapter 13: Evaluating Offensive Security Processes
  • Chapter 14: Experimentation
  • Chapter 15: Validation.-.