Professional Red teaming: conducting successful cybersecurity engagements
Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scri...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Berkeley, CA]
Apress
2019
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781484243091/?ar |
Zusammenfassung: | Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools. Professional Red Teaming introduces you to foundational offensive security concepts. The importance of assessments and ethical hacking is highlighted, and automated assessment technologies are addressed. The state of modern offensive security is discussed in terms of the unique challenges present in professional red teaming. Best practices and operational tradecraft are covered so you feel comfortable in the shaping and carrying out of red team engagements. Anecdotes from actual operations and example scenarios illustrate key concepts and cement a practical understanding of the red team process. You also are introduced to counter advanced persistent threat red teaming (CAPTR teaming). This is a reverse red teaming methodology aimed at specifically addressing the challenges faced from advanced persistent threats (APTs) by the organizations they target and the offensive security professionals trying to mitigate them. What You'll Learn: Understand the challenges faced by offensive security assessments Incorporate or conduct red teaming to better mitigate cyber threats Initiate a successful engagement Get introduced to counter-APT red teaming (CAPTR) Evaluate offensive security processes. |
Beschreibung: | Includes index. - Online resource; title from PDF title page (SpringerLink, viewed March 13, 2019) |
Umfang: | 1 Online-Ressource |
ISBN: | 9781484243091 1484243099 1484243102 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047610050 | ||
003 | DE-627-1 | ||
005 | 20240228120653.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2019 xx |||||o 00| ||eng c | ||
020 | |a 9781484243091 |c electronic bk. |9 978-1-4842-4309-1 | ||
020 | |a 1484243099 |c electronic bk. |9 1-4842-4309-9 | ||
020 | |a 1484243102 |9 1-4842-4310-2 | ||
035 | |a (DE-627-1)047610050 | ||
035 | |a (DE-599)KEP047610050 | ||
035 | |a (ORHE)9781484243091 | ||
035 | |a (DE-627-1)047610050 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a UR |2 bicssc | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Oakley, Jacob G. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Professional Red teaming |b conducting successful cybersecurity engagements |c Jacob G. Oakley |
264 | 1 | |a [Berkeley, CA] |b Apress |c 2019 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index. - Online resource; title from PDF title page (SpringerLink, viewed March 13, 2019) | ||
520 | |a Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools. Professional Red Teaming introduces you to foundational offensive security concepts. The importance of assessments and ethical hacking is highlighted, and automated assessment technologies are addressed. The state of modern offensive security is discussed in terms of the unique challenges present in professional red teaming. Best practices and operational tradecraft are covered so you feel comfortable in the shaping and carrying out of red team engagements. Anecdotes from actual operations and example scenarios illustrate key concepts and cement a practical understanding of the red team process. You also are introduced to counter advanced persistent threat red teaming (CAPTR teaming). This is a reverse red teaming methodology aimed at specifically addressing the challenges faced from advanced persistent threats (APTs) by the organizations they target and the offensive security professionals trying to mitigate them. What You'll Learn: Understand the challenges faced by offensive security assessments Incorporate or conduct red teaming to better mitigate cyber threats Initiate a successful engagement Get introduced to counter-APT red teaming (CAPTR) Evaluate offensive security processes. | ||
650 | 0 | |a Computer security | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer security | |
776 | 1 | |z 1484243080 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1484243080 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781484243091/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047610050 |
---|---|
_version_ | 1821494873090424832 |
adam_text | |
any_adam_object | |
author | Oakley, Jacob G. |
author_facet | Oakley, Jacob G. |
author_role | aut |
author_sort | Oakley, Jacob G. |
author_variant | j g o jg jgo |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047610050 (DE-599)KEP047610050 (ORHE)9781484243091 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03128cam a22004692 4500</leader><controlfield tag="001">ZDB-30-ORH-047610050</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120653.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484243091</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4842-4309-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1484243099</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4842-4309-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1484243102</subfield><subfield code="9">1-4842-4310-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047610050</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047610050</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781484243091</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047610050</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UR</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Oakley, Jacob G.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Professional Red teaming</subfield><subfield code="b">conducting successful cybersecurity engagements</subfield><subfield code="c">Jacob G. Oakley</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Berkeley, CA]</subfield><subfield code="b">Apress</subfield><subfield code="c">2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Online resource; title from PDF title page (SpringerLink, viewed March 13, 2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools. Professional Red Teaming introduces you to foundational offensive security concepts. The importance of assessments and ethical hacking is highlighted, and automated assessment technologies are addressed. The state of modern offensive security is discussed in terms of the unique challenges present in professional red teaming. Best practices and operational tradecraft are covered so you feel comfortable in the shaping and carrying out of red team engagements. Anecdotes from actual operations and example scenarios illustrate key concepts and cement a practical understanding of the red team process. You also are introduced to counter advanced persistent threat red teaming (CAPTR teaming). This is a reverse red teaming methodology aimed at specifically addressing the challenges faced from advanced persistent threats (APTs) by the organizations they target and the offensive security professionals trying to mitigate them. What You'll Learn: Understand the challenges faced by offensive security assessments Incorporate or conduct red teaming to better mitigate cyber threats Initiate a successful engagement Get introduced to counter-APT red teaming (CAPTR) Evaluate offensive security processes.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1484243080</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1484243080</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781484243091/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047610050 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:21:17Z |
institution | BVB |
isbn | 9781484243091 1484243099 1484243102 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Apress |
record_format | marc |
spelling | Oakley, Jacob G. VerfasserIn aut Professional Red teaming conducting successful cybersecurity engagements Jacob G. Oakley [Berkeley, CA] Apress 2019 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index. - Online resource; title from PDF title page (SpringerLink, viewed March 13, 2019) Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools. Professional Red Teaming introduces you to foundational offensive security concepts. The importance of assessments and ethical hacking is highlighted, and automated assessment technologies are addressed. The state of modern offensive security is discussed in terms of the unique challenges present in professional red teaming. Best practices and operational tradecraft are covered so you feel comfortable in the shaping and carrying out of red team engagements. Anecdotes from actual operations and example scenarios illustrate key concepts and cement a practical understanding of the red team process. You also are introduced to counter advanced persistent threat red teaming (CAPTR teaming). This is a reverse red teaming methodology aimed at specifically addressing the challenges faced from advanced persistent threats (APTs) by the organizations they target and the offensive security professionals trying to mitigate them. What You'll Learn: Understand the challenges faced by offensive security assessments Incorporate or conduct red teaming to better mitigate cyber threats Initiate a successful engagement Get introduced to counter-APT red teaming (CAPTR) Evaluate offensive security processes. Computer security Computer Security Sécurité informatique COMPUTERS ; Security ; General 1484243080 Erscheint auch als Druck-Ausgabe 1484243080 |
spellingShingle | Oakley, Jacob G. Professional Red teaming conducting successful cybersecurity engagements Computer security Computer Security Sécurité informatique COMPUTERS ; Security ; General |
title | Professional Red teaming conducting successful cybersecurity engagements |
title_auth | Professional Red teaming conducting successful cybersecurity engagements |
title_exact_search | Professional Red teaming conducting successful cybersecurity engagements |
title_full | Professional Red teaming conducting successful cybersecurity engagements Jacob G. Oakley |
title_fullStr | Professional Red teaming conducting successful cybersecurity engagements Jacob G. Oakley |
title_full_unstemmed | Professional Red teaming conducting successful cybersecurity engagements Jacob G. Oakley |
title_short | Professional Red teaming |
title_sort | professional red teaming conducting successful cybersecurity engagements |
title_sub | conducting successful cybersecurity engagements |
topic | Computer security Computer Security Sécurité informatique COMPUTERS ; Security ; General |
topic_facet | Computer security Computer Security Sécurité informatique COMPUTERS ; Security ; General |
work_keys_str_mv | AT oakleyjacobg professionalredteamingconductingsuccessfulcybersecurityengagements |