March 2022
Intermediate to advanced
752 pages
18h 47m
English
In this chapter, we cover the following topics:
• Introduction to red teams
• Components of a red team
• Threat simulation
• Making money with red teaming
• Purple teams
Although we covered what an ethical hacker is in Chapter 1, it’s important to understand what the role of an ethical hacker is in the context of the security ecosystem. For both corporate security and consulting, ethical hackers help provide an adversarial mindset to security to help organizations understand what an attacker would see, what they could do, and what the impact would be. This helps organizations grow both tactically, by fixing specific issues, and strategically, by changing the way they operate and do business.