To prevent security threats, improving the cybersecurity posture of your organization using effective Red Team and Blue Team tactics is crucial.
In this book, you'll start by exploring the concept of security posture before moving on to Red Team tactics, where you will learn the basic syntax for Windows and Linux tools that are commonly used to perform the necessary operations. You will then get hands-on with using Red Team techniques with powerful tools such as Python and PowerShell, which will enable you to discover vulnerabilities in your system and exploit them. As you progress, you'll learn how a system is usually compromised by adversaries and how they hack a user's identity, along with the different tools used by the Red Team to find vulnerabilities, protect the user's identity and prevent credential theft. Next, you'll focus on the defense strategies followed by the Blue Team to enhance the overall security of a system. You will learn how to ensure that there are security controls in each network layer, and carry out the recovery process of a compromised system. Finally, you'll get to grips with creating a vulnerability management strategy and discover different techniques for manual log analysis.
By the end of this book, you will be well-versed with Red and Blue Team tactics and have learned the latest techniques to attack and defend systems.
What you will learn
Who This Book Is For
This book is for IT professionals who want to venture into the IT security domain. IT pentesters, security consultants, and ethical hackers will also find this book useful. Prior knowledge of penetration testing will be beneficial.
|No of pages||384|
|Book Publisher||Packt Publishing|
|Published Date||01 Jan 2018|
Author : Erdal OzkayaNA
Erdal Ozkaya is a doctor of philosophy in Cybersecurity, master of information systems security, master of computing research CEI, MCT, MCSE, E|CEH, E|CSA, E|CISO, CFR, and CISSP. He works for Microsoft as a cybersecurity architect and security advisor and is also a part-time lecturer at Australian Charles Sturt University. He has coauthored many security certification coursewares for different vendors and speaks in worldwide conferences. He has won many awards in his field and works hard to make the Cyber-World safe.
© 2021 Dharya Information Private Limited