Check nearby libraries
Buy this book
The book begins by exploring the foundational concepts of security posture before transitioning into the intricacies of Red Team tactics. Here, you’ll familiarize yourself with the essential syntax of widely-used Windows and Linux tools, which are critical for executing key operations. Through practical exercises, you’ll gain firsthand experience with advanced Red Team methodologies, leveraging powerful scripting languages like Python and PowerShell. These skills will empower you to identify system vulnerabilities and understand the methods to exploit them effectively.
As you progress, the book delves into the typical techniques adversaries use to compromise systems, including identity theft and credential hacking. You’ll also explore the arsenal of tools employed by Red Teams to uncover weaknesses within a system’s defenses.
The subsequent section shifts focus to the defensive strategies employed by the Blue Team, aimed at bolstering a system’s overall security. You’ll dive into comprehensive strategies for implementing security controls across every layer of a network and learn the step-by-step process for recovering a compromised system. The book concludes by guiding you through the development of a robust vulnerability management strategy and introduces various techniques for conducting manual log analysis to detect and mitigate potential threats.
Check nearby libraries
Buy this book
Subjects
Cybersecurity, cyber attacksTimes
2018-| Edition | Availability |
|---|---|
|
1
Cybersecurity - Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
2018, Amazon
1788475291 9781788475297
|
aaaa
|
Book Details
Edition Identifiers
Work Identifiers
Community Reviews (0)
History
- Created March 10, 2025
- 2 revisions
Wikipedia citation
×CloseCopy and paste this code into your Wikipedia page. Need help?
| March 10, 2025 | Edited by YingSeow | //covers.openlibrary.org/b/id/14851009-S.jpg |
| March 10, 2025 | Created by YingSeow | Added new book. |

