LEADER 03609nam 22005055 450 001 9910338014803321 005 20251214171535.0 010 $a9781484243091 010 $a1484243099 024 7 $a10.1007/978-1-4842-4309-1 035 $a(CKB)4100000007761892 035 $a(MiAaPQ)EBC5726261 035 $a(DE-He213)978-1-4842-4309-1 035 $a(CaSebORM)9781484243091 035 $a(PPN)235234877 035 $a(OCoLC)1104212015 035 $a(OCoLC)on1104212015 035 $a(EXLCZ)994100000007761892 100 $a20190308d2019 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aProfessional Red Teaming $eConducting Successful Cybersecurity Engagements /$fby Jacob G. Oakley 205 $a1st ed. 2019. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2019. 215 $a1 online resource (215 pages) 311 08$a9781484243084 311 08$a1484243080 327 $aChapter 1: Red Teams in Cyberspace -- Chapter 2: Why Human Hackers? -- Chapter 3: The State of Modern Offensive Security -- Chapter 4: Shaping -- Chapter 5: Rules of Engagement -- Chapter 6: Executing -- Chapter 7: Reporting -- Chapter 8: Purple Teaming -- Chapter 9: Counter-APT Red Teaming -- Chapter 10: Outcome Oriented Scoping -- Chapter 11: Initialization Perspectives -- Chapter 12: Reverse Red Teaming -- Chapter 13: Evaluating Offensive Security Processes -- Chapter 14: Experimentation -- Chapter 15: Validation.-. 330 $aUse this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools. Professional Red Teaming introduces you to foundational offensive security concepts. The importance of assessments and ethical hacking is highlighted, and automated assessment technologies are addressed. The state of modern offensive security is discussed in terms of the unique challenges present in professional red teaming. Best practices and operational tradecraft are covered so you feel comfortable in the shaping and carrying out of red team engagements. Anecdotes from actual operations and example scenarios illustrate key concepts and cement a practical understanding of the red team process. You also are introduced to counter advanced persistent threat red teaming (CAPTR teaming). This is a reverse red teaming methodology aimed at specifically addressing the challenges faced from advanced persistent threats (APTs) by the organizations they target and the offensive security professionals trying to mitigate them. What You?ll Learn: Understand the challenges faced by offensive security assessments Incorporate or conduct red teaming to better mitigate cyber threats Initiate a successful engagement Get introduced to counter-APT red teaming (CAPTR) Evaluate offensive security processes. 517 3 $aConducting successful cybersecurity engagements 606 $aData protection 606 $aSecurity$3https://scigraph.springernature.com/ontologies/product-market-codes/I28000 615 0$aData protection. 615 14$aSecurity. 676 $a005.8 700 $aOakley$b Jacob G.$4aut$4http://id.loc.gov/vocabulary/relators/aut$01060615 801 0$bUMI 801 1$bUMI 906 $aBOOK 912 $a9910338014803321 996 $aProfessional Red Teaming$92536861 997 $aUNINA