Key FeaturesGain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tacticsLearn to unique techniques to gather exploitation intelligence, identify risk and demonstrate impact with Red Team and Blue Team strategiesA practical guide that will give you hands-on experience to mitigate risks and prevent attackers from infiltrating your systemBook DescriptionThe book will start talking about the security posture before moving to Red Team tactics, where you will learn the basic syntax for the Windows and Linux tools that are commonly used to perform the necessary operations. You will also gain hands-on experience of using new Red Team techniques with powerful tools such as python and PowerShell, which will enable you to discover vulnerabilities in your system and how to exploit them. Moving on, you will learn how a system is usually compromised by adversaries, and how they hack user's identity, and the various tools used by the Red Team to find vulnerabilities in a system.
In the next section, you will learn about the defense strategies followed by the Blue Team to enhance the overall security of a system. You will also learn about an in-depth strategy to ensure that there are security controls in each network layer, and how you can carry out the recovery process of a compromised system. Finally, you will learn how to create a vulnerability management strategy and the different techniques for manual log analysis.
What you will learnLearn the importance of having a solid foundation for your security postureUnderstand the attack strategy using cyber security kill chainLearn how to enhance your defense strategy by improving your security policies, hardening your network, implementing active sensors, and leveraging threat intelligenceLearn how to perform an incident investigationGet an in-depth understanding of the recovery processUnderstand continuous security monitoring and how to implement a vulnerability management strategyLearn how to perform log analysis to identify suspicious activitiesWho this book is forThis book aims at IT professional who want to venture the IT security domain. IT pentester, Security consultants, and ethical hackers will also find this course useful. Prior knowledge of penetration testing would be beneficial.
Table of ContentsSecurity PostureIncident Response ProcessUnderstanding the Cybersecurity Kill ChainReconnaissance Compromising the SystemChasing a User's IdentityLateral MovementPrivilege EscalationSecurity Policy Network SegmentationActive Sensors Threat IntelligenceInvestigating an IncidentRecovery ProcessVulnerability ManagementLog Analysis
This is great since it covers the most important topic about the latest security threats and defense strategies for 2020, introduces many techniques to conduct threat hunting, and deal with a system breach. Anybody reading this book should definitely be fascinated since the information in the are fresh and easy to absorb. Moreover, the book covers important topics about information security which make readers become proficient after completing them. Great Book though
Well first check amazon before reading it since there is not enough reviews for it in here. Its authors are very succesful people in their major. Book is very good and explanative about cybersecurity subjects. I recommend it for the enthusiasts who has knowledge in computer science. It's not for amateurs I think. It will help learning known attack and defense types. But it's not like attack-defend scenarios are examined for both sides. More like known concepts are explained in order. I especially recommend computer science students who are freshman. Before selecting a semimajor it will help you get an idea for cybersecurity.
This book defines the standard for what a well organised reference book about cybersecurity shall be. Precise definitions, straight to the point. Thanks for all the references with still active links.