Adversarial Tradecraft in Cybersecurity
By taking you through the logic of complex strategic decisions of offensive and defensive teams, this book will prepare you for real-time cybersecurity conflict and show you some of the best techniques used in the industry. Whether you’re part of an offensive or defensive team, Adversarial TradeCraft in Cybersecurity will prepare you for the daunting challenge of taking part in real-time action.
Offered by
Difficulty Level
Intermediate
Completion Time
8h12m
Language
English
About Book
Who Is This Book For?
Pentesters to red teamers, security operations center analysts to incident responders, attackers, defenders, general hackers, advanced computer users, and security engineers will benefit from this book. Participants in purple teaming or adversarial simulations will also learn a lot from its practical examples of processes for gaining an advantage over the opposing team. Basic knowledge of Python, Go, Bash, PowerShell, system administration as well as knowledge of incident response in Linux and prior exposure to any kind of cybersecurity knowledge, penetration testing, and ethical hacking basics will help you follow along.
Adversarial Tradecraft in Cybersecurity
- About Book
- Who Is This Book For?
- Book Content
Book content
chapters • 8h12m total length
Theory on Adversarial Operations and Principles of Computer Conflict
Preparing for Battle
Invisible is Best (Operating in Memory)
Blending In
Active Manipulation
Real-Time Conflict
The Research Advantage
Clearing the Field
Related Resources
Access Ready-to-Use Books for Free!
Get instant access to a library of pre-built books—free trial, no credit card required. Start training your team in minutes!