Cybersecurity Attacks:Red Team Strategies
It'snowmoreimportantthaneverfororganizationstobereadytodetectandrespondtosecurityeventsandbreaches.Preventivemeasuresalonearenotenoughfordealingwithadversaries.Awell-roundedprevention,detection,andresponseprogramisrequired.Thisbookwillguideyouthroughthestagesofbuildingaredteamprogram,includingstrategiesandhomefieldadvantageopportunitiestoboostsecurity.Thebookstartsbyguidingyouthroughestablishing,managing,andmeasuringaredteamprogram,includingeffectivewaysforsharingresultsandfindingstoraiseawareness.Gradually,you'lllearnaboutprogressiveoperationssuchascryptocurrencymining,focusedprivacytesting,targetingtelemetry,andevenblueteamtooling.Later,you'lldiscoverknowledgegraphsandhowtobuildthem,thenbecomewell-versedwithbasictoadvancedtechniquesrelatedtohuntingforcredentials,andlearntoautomateMicrosoftOfficeandbrowserstoyouradvantage.Finally,you'llgettogripswithprotectingassetsusingdecoys,auditing,andalertingwithexamplesformajoroperatingsystems.Bytheendofthisbook,you'llhavelearnedhowtobuild,manage,andmeasurearedteamprogrameffectivelyandbewell-versedwiththefundamentaloperationaltechniquesrequiredtoenhanceyourexistingskills.
·11萬字