Purple Team Strategies

Purple Team Strategies

David Routin / Samuel Rossier / Simon Thoores

57,28 €
IVA incluido
Disponible
Editorial:
Packt Publishing
Año de edición:
2022
ISBN:
9781801074292
57,28 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería 7artes
  • Donde los libros
  • Librería Elías (Asturias)
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Leverage cyber threat intelligence and the MITRE framework to enhance your prevention mechanisms, detection capabilities, and learn top adversarial simulation and emulation techniquesKey Features:Apply real-world strategies to strengthen the capabilities of your organization’s security systemLearn to not only defend your system but also think from an attacker’s perspectiveEnsure the ultimate effectiveness of an organization’s red and blue teams with practical tipsBook Description:With small to large companies focusing on hardening their security systems, the term 'purple team' has gained a lot of traction over the last couple of years. Purple teams represent a group of individuals responsible for securing an organization’s environment using both red team and blue team testing and integration - if you’re ready to join or advance their ranks, then this book is for you.Purple Team Strategies will get you up and running with the exact strategies and techniques used by purple teamers to implement and then maintain a robust environment. You’ll start with planning and prioritizing adversary emulation, and explore concepts around building a purple team infrastructure as well as simulating and defending against the most trendy ATT&CK tactics. You’ll also dive into performing assessments and continuous testing with breach and attack simulations.Once you’ve covered the fundamentals, you’ll also learn tips and tricks to improve the overall maturity of your purple teaming capabilities along with measuring success with KPIs and reporting.With the help of real-world use cases and examples, by the end of this book, you’ll be able to integrate the best of both sides: red team tactics and blue team security measures.What You Will Learn:Learn and implement the generic purple teaming processUse cloud environments for assessment and automationIntegrate cyber threat intelligence as a processConfigure traps inside the network to detect attackersImprove red and blue team collaboration with existing and new toolsPerform assessments of your existing security controlsWho this book is for:If you’re a cybersecurity analyst, SOC engineer, security leader or strategist, or simply interested in learning about cyber attack and defense strategies, then this book is for you. Purple team members and chief information security officers (CISOs) looking at securing their organizations from adversaries will also benefit from this book. You’ll need some basic knowledge of Windows and Linux operating systems along with a fair understanding of networking concepts before you can jump in, while ethical hacking and penetration testing know-how will help you get the most out of this book.

Artículos relacionados

  • TCP/IP - The Ultimate Protocol Guide
    Philip M Miller
    This is the complete 2 volume set, containing both volumes one (ISBN: 9781599424910) and two (ISBN: 9781599425436) packaged together. The book provides a complete guide to the protocols that comprise the Internet Protocol Suite, more commonly referred to as TCP/IP. The work assumes no prior knowledge of TCP/IP and only a rudimentary understanding of LAN/WAN access methods. The ...
    Disponible

    142,53 €

  • TCP/IP - The Ultimate Protocol Guide
    Philip M. Miller / Philip MMiller
    TCP/IP - The Ultimate Protocol Guide is written to cover all facets of the Internet Protocol suite. This two volume set makes no assumptions as to prior knowledge of the protocols, nor does it assume expertise in LAN access techniques. Instead, in Volume One (Data Delivery and Routing), the reader is guided through the mechanics of Local Area Networks before embarking on disc...
    Disponible

    104,23 €

  • TCP/IP Essentials
    Jeong-Dong Ryoo / Shivendra Panwar / Shiwen Mao
    ...
    Disponible

    103,20 €

  • Multiprotocol Routing for Sans
    Josh Judd
    Multiprotocol routers have been used in data networks for decades, but routers built specifically for Storage Area Networks (SANs) are a recent innovation. This book covers multiprotocol SAN routing in general and the Brocade SilkWorm Multiprotocol Router platform in particular. Multiprotocol SAN routers today usually provide three services: Fibre Channel to Fibre Channel rout...
    Consulta disponibilidad

    30,42 €

  • Principles of SAN Design Second Edition
    Josh Judd
    Principles of SAN Design offers a 'one stop shop' for SAN design knowledge. Why wait? Read the definitive work on SAN design today! ...
    Consulta disponibilidad

    37,89 €

  • Path Problems in Networks
    George Theodorakopoulos / Jean Walrand / John Baras
    The algebraic path problem is a generalization of the shortest path problem in graphs. Various instances of this abstract problem have appeared in the literature, and similar solutions have been independently discovered and rediscovered. The repeated appearance of a problem is evidence of its relevance. This book aims to help current and future researchers add this powerful too...
    Consulta disponibilidad

    43,43 €