Book description
Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools.
Professional Red Teaming introduces you to foundational offensive security concepts. The importance of assessments and ethical hacking is highlighted, and automated assessment technologies are addressed. The state of modern offensive security is discussed in terms of the unique challenges present in professional red teaming.
Best practices and operational tradecraft are covered so you feel comfortable in the shaping and carrying out of red team engagements. Anecdotes from actual operations and example scenarios illustrate key concepts and cement a practical understanding of the red team process.
You also are introduced to counter advanced persistent threat red teaming (CAPTR teaming). This is a reverse red teaming methodology aimed at specifically addressing the challenges faced from advanced persistent threats (APTs) by the organizations they target and the offensive security professionals trying to mitigate them.
What You’ll Learn
- Understand the challenges faced by offensive security assessments
- Incorporate or conduct red teaming to better mitigate cyber threats
- Initiate a successful engagement
- Get introduced to counter-APT red teaming (CAPTR)
- Evaluate offensive security processes
Who This Book Is For
Offensive security assessors and those who want a working knowledge of the process, its challenges, and its benefits. Current professionals will gain tradecraft and operational insight and non-technical readers will gain a high-level perspective of what it means to provide and be a customer of red team assessments.
Table of contents
- Cover
- Front Matter
- 1. Red Teams in Cyberspace
- 2. Why Human Hackers?
- 3. The State of Modern Offensive Security
- 4. Shaping
- 5. Rules of Engagement
- 6. Executing
- 7. Reporting
- 8. Purple Teaming
- 9. Counter-APT Red Teaming
- 10. Outcome-oriented Scoping
- 11. Initialization Perspectives
- 12. Reverse Red Teaming
- 13. Evaluating Offensive Security Processes
- 14. Experimentation
- 15. Validation
- Back Matter
Product information
- Title: Professional Red Teaming: Conducting Successful Cybersecurity Engagements
- Author(s):
- Release date: March 2019
- Publisher(s): Apress
- ISBN: 9781484243091
You might also like
book
Learn Kali Linux 2019
Explore the latest ethical hacking tools and techniques in Kali Linux 2019 to perform penetration testing …
book
Cybersecurity Blue Team Toolkit
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data …
book
Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits
The perfect introduction to pen testing for all IT professionals and students · Clearly explains key …
book
Tribe of Hackers Red Team
Want Red Team offensive advice from the biggest cybersecurity names in the industry? Join our tribe. …