Cybersecurity - Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Yuri Diogenes, Erdal Ozkaya

買這商品的人也買了...

商品描述

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique techniques to gather exploitation intelligence, identify risk and demonstrate impact with Red Team and Blue Team strategies.
  • A practical guide that will give you hands-on experience to mitigate risks and prevent attackers from infiltrating your system.

Book Description

The book will start talking about the security posture before moving to Red Team tactics, where you will learn the basic syntax for the Windows and Linux tools that are commonly used to perform the necessary operations. You will also gain hands-on experience of using new Red Team techniques with powerful tools such as python and PowerShell, which will enable you to discover vulnerabilities in your system and how to exploit them. Moving on, you will learn how a system is usually compromised by adversaries, and how they hack user's identity, and the various tools used by the Red Team to find vulnerabilities in a system.

In the next section, you will learn about the defense strategies followed by the Blue Team to enhance the overall security of a system. You will also learn about an in-depth strategy to ensure that there are security controls in each network layer, and how you can carry out the recovery process of a compromised system. Finally, you will learn how to create a vulnerability management strategy and the different techniques for manual log analysis.

By the end of this book, you will be well-versed with Red Team and Blue Team techniques and will have learned the techniques used nowadays to attack and defend systems.

What you will learn

  • Learn the importance of having a solid foundation for your security posture
  • Understand the attack strategy using cyber security kill chain
  • Learn how to enhance your defense strategy by improving your security policies, hardening your network, implementing active sensors, and leveraging threat intelligence
  • Learn how to perform an incident investigation
  • Get an in-depth understanding of the recovery process
  • Understand continuous security monitoring and how to implement a vulnerability management strategy
  • Learn how to perform log analysis to identify suspicious activities

Who This Book Is For

This book aims at IT professional who want to venture the IT security domain. IT pentester, Security consultants, and ethical hackers will also find this course useful. Prior knowledge of penetration testing would be beneficial.

Table of Contents

  1. Secure Posture
  2. Incident Response Process
  3. Understanding the Cybersecurity Kill Chain
  4. Reconnaissance
  5. Compromising the system
  6. Chasing User's Identity
  7. Lateral Movement
  8. Privilege Escalation
  9. Security Policy
  10. Network segmentation
  11. Active sensors
  12. Threat Intelligence
  13. Investigating an Incident
  14. Recovery Process
  15. Vulnerability management
  16. Log Analysis

商品描述(中文翻譯)

增強您組織的安全姿態,改進攻擊和防禦策略

主要特點

- 通過藍隊策略,獲得對攻擊方法和模式的清晰理解,以識別組織內的異常行為。
- 學習獨特的技術,使用紅隊和藍隊策略收集利用情報、識別風險並展示影響。
- 提供實用指南,讓您親自體驗風險緩解和防止攻擊者滲透系統的方法。

書籍描述

本書將從安全姿態開始,然後介紹紅隊策略,您將學習常用於執行必要操作的Windows和Linux工具的基本語法。您還將使用強大的工具(如Python和PowerShell)親自體驗使用新的紅隊技術,以發現系統中的漏洞及其利用方法。接下來,您將了解對手通常如何入侵系統,以及他們如何入侵使用者身份,以及紅隊在尋找系統漏洞時使用的各種工具。

在下一部分中,您將學習藍隊的防禦策略,以增強系統的整體安全性。您還將了解確保每個網絡層中都有安全控制的深入策略,以及如何執行受到入侵的系統的恢復過程。最後,您將學習如何創建漏洞管理策略以及手動日誌分析的不同技術。

通過閱讀本書,您將熟悉紅隊和藍隊技術,並學習當今攻擊和防禦系統所使用的技術。

您將學到什麼

- 學習建立堅實基礎的安全姿態的重要性
- 了解使用網絡安全殺手鏈的攻擊策略
- 學習通過改進安全策略、加固網絡、實施主動感應器和利用威脅情報來增強防禦策略
- 學習如何進行事件調查
- 深入了解恢復過程
- 了解持續安全監控以及如何實施漏洞管理策略
- 學習如何進行日誌分析以識別可疑活動

本書適合對IT安全領域感興趣的IT專業人士。IT滲透測試人員、安全顧問和道德黑客也會發現本書有用。具備滲透測試的先備知識將有所裨益。

目錄

1. 安全姿態
2. 事件回應流程
3. 瞭解網絡安全殺手鏈
4. 偵察
5. 入侵系統
6. 追蹤使用者身份
7. 橫向移動
8. 權限提升
9. 安全策略
10. 網絡分割
11. 主動感應器
12. 威脅情報
13. 調查事件
14. 恢復過程
15. 漏洞管理
16. 日誌分析