O'Reilly logo

Breaking into Information Security by Chris Liu, Anthony J. Stieber, Josh More

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3.5

Tier 3—Tiger Team Member—Tiger Team Lead (Red Team)

Abstract

Tiger Teams, also known as Red Teams, are well staffed and well funded groups activated during particularly nasty incidents and will often be sent into the line of fire. On the positive side, you will be working with the best people in the world as you dig into network and forensics dumps, set traps, isolate attackers, and work to figure not only what happened and prevent it from happening again, but also (in some cases) how to retaliate. But pulling an all-nighter is not just possible, but common. You may find yourself putting a full week’s worth of work in a mere two days, and then have to keep working.

Keywords

Tiger Team
Red Team
incident response
network security
forensics ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required