Jump to ratings and reviews
Rate this book

Cybersecurity - Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Rate this book
Key FeaturesGain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tacticsLearn to unique techniques to gather exploitation intelligence, identify risk and demonstrate impact with Red Team and Blue Team strategiesA practical guide that will give you hands-on experience to mitigate risks and prevent attackers from infiltrating your systemBook DescriptionThe book will start talking about the security posture before moving to Red Team tactics, where you will learn the basic syntax for the Windows and Linux tools that are commonly used to perform the necessary operations. You will also gain hands-on experience of using new Red Team techniques with powerful tools such as python and PowerShell, which will enable you to discover vulnerabilities in your system and how to exploit them. Moving on, you will learn how a system is usually compromised by adversaries, and how they hack user's identity, and the various tools used by the Red Team to find vulnerabilities in a system.

In the next section, you will learn about the defense strategies followed by the Blue Team to enhance the overall security of a system. You will also learn about an in-depth strategy to ensure that there are security controls in each network layer, and how you can carry out the recovery process of a compromised system. Finally, you will learn how to create a vulnerability management strategy and the different techniques for manual log analysis.

What you will learnLearn the importance of having a solid foundation for your security postureUnderstand the attack strategy using cyber security kill chainLearn how to enhance your defense strategy by improving your security policies, hardening your network, implementing active sensors, and leveraging threat intelligenceLearn how to perform an incident investigationGet an in-depth understanding of the recovery processUnderstand continuous security monitoring and how to implement a vulnerability management strategyLearn how to perform log analysis to identify suspicious activitiesWho this book is forThis book aims at IT professional who want to venture the IT security domain. IT pentester, Security consultants, and ethical hackers will also find this course useful. Prior knowledge of penetration testing would be beneficial.

Table of ContentsSecurity PostureIncident Response ProcessUnderstanding the Cybersecurity Kill ChainReconnaissance Compromising the SystemChasing a User's IdentityLateral MovementPrivilege EscalationSecurity Policy Network SegmentationActive Sensors Threat IntelligenceInvestigating an IncidentRecovery ProcessVulnerability ManagementLog Analysis

386 pages, Kindle Edition

Published January 30, 2018

123 people are currently reading
231 people want to read

About the author

Yuri Diogenes

30 books9 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
28 (41%)
4 stars
26 (38%)
3 stars
10 (14%)
2 stars
2 (2%)
1 star
2 (2%)
Displaying 1 - 6 of 6 reviews
1 review
May 1, 2020
This is great since it covers the most important topic about the latest security threats and defense strategies for 2020, introduces many techniques to conduct threat hunting, and deal with a system breach. Anybody reading this book should definitely be fascinated since the information in the are fresh and easy to absorb. Moreover, the book covers important topics about information security which make readers become proficient after completing them.
Great Book though
1 review
May 3, 2020
Well first check amazon before reading it since there is not enough reviews for it in here. Its authors are very succesful people in their major. Book is very good and explanative about cybersecurity subjects. I recommend it for the enthusiasts who has knowledge in computer science. It's not for amateurs I think. It will help learning known attack and defense types. But it's not like attack-defend scenarios are examined for both sides. More like known concepts are explained in order. I especially recommend computer science students who are freshman. Before selecting a semimajor it will help you get an idea for cybersecurity.
14 reviews
October 19, 2024
The reference book for cybersecurity

This book defines the standard for what a well organised reference book about cybersecurity shall be. Precise definitions, straight to the point. Thanks for all the references with still active links.
1 review
July 31, 2025
Being compatible with Kindle is eminent!

That is really great to review all the C2 framework for red team as cyber security pen-tester like me. Recommended!
Profile Image for Sergio Benz.
1 review
February 24, 2018
Great book which shows everything what i need regarding cybersecurity from Red & blue team perspective. I love well done Yrui and Erdal
Displaying 1 - 6 of 6 reviews

Can't find what you're looking for?

Get help and learn more about the design.