Book Content
chapters • 17h28m total length
1. Establishing an Offensive Security Program
2. Managing an Offensive Security Team
3. Measuring an Offensive Security Program
4. Progressive Red Team Operations
5. Situational Awareness – Mapping Out the Homefield Using Graph Databases
6. Building a Comprehensive Knowledge Graph
7. Hunting for Credentials
8. Advanced Credential Hunting
9. Powerful Automation
10. Protecting the Pen Tester
11. Traps, Deceptions, and Honeypots
12. Blue Team Tactics for the Red Team














