Details

Tribe of Hackers Blue Team


Tribe of Hackers Blue Team

Tribal Knowledge from the Best in Defensive Cybersecurity
Tribe of Hackers 1. Aufl.

von: Marcus J. Carey, Jennifer Jin

16,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 11.08.2020
ISBN/EAN: 9781119643449
Sprache: englisch
Anzahl Seiten: 368

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>Blue Team defensive advice from the biggest names in cybersecurity</b></p> <p>The <i>Tribe of Hackers</i> team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world’s leading Blue Team security specialists show you how to harden systems against real and simulated breaches and attacks. You’ll discover the latest strategies for blocking even the most advanced red-team attacks and preventing costly losses. The experts share their hard-earned wisdom, revealing what works and what doesn’t in the real world of cybersecurity.</p> <p><i>Tribe of Hackers Blue Team</i> goes beyond the bestselling, original <i>Tribe of Hackers </i>book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises.</p> <ul> <li>Discover what it takes to get started building blue team skills</li> <li>Learn how you can defend against physical and technical penetration testing</li> <li>Understand the techniques that advanced red teamers use against high-value targets</li> <li>Identify the most important tools to master as a blue teamer</li> <li>Explore ways to harden systems against red team attacks</li> <li>Stand out from the competition as you work to advance your cybersecurity career</li> </ul> <p>Authored by leaders in cybersecurity attack and breach simulations, the <i>Tribe of Hackers </i>series is perfect for those new to blue team security, experienced practitioners, and cybersecurity team leaders. <i>Tribe of Hackers Blue Team</i> has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the blue team defense.</p>
<p>Acknowledgments vii</p> <p>Foreword ix</p> <p>Introduction xi</p> <p>01 Marcus J. Carey 1</p> <p>02 Danny Akacki 6</p> <p>03 Ricky Banda 9</p> <p>04 William Bengtson 14</p> <p>05 Amanda Berlin 20</p> <p>06 O’Shea Bowens 27</p> <p>07 John Breth 31</p> <p>08 Lee Brotherston 38</p> <p>09 Ronald Bushar 47</p> <p>10 Christopher Caruso 56</p> <p>11 Eddie Clark 66</p> <p>12 Mark Clayton 74</p> <p>13 Ayman Elsawah 80</p> <p>14 Sahan Fernando 91</p> <p>15 Stephen Hilt 96</p> <p>16 Bea Hughes 101</p> <p>17 Terence Jackson 109</p> <p>18 Tanya Janca 113</p> <p>19 Ruth Juma 119</p> <p>20 Brendon Kelley 123</p> <p>21 Shawn Kirkland 129</p> <p>22 Sami Laiho 139</p> <p>23 Kat Maddox 143</p> <p>24 Jeffrey Man 147</p> <p>25 April Mardock 154</p> <p>26 Bright Gameli Mawudor 159</p> <p>27 Duncan McAlynn 164</p> <p>28 Frank McGovern 170</p> <p>29 Donald McFarlane 172</p> <p>30 Nathan McNulty 180</p> <p>31 James Medlock 187</p> <p>32 Daniel Miessler 192</p> <p>33 Alyssa Miller 196</p> <p>34 Maggie Morganti 205</p> <p>35 Justin Moss 211</p> <p>36 Mark Orlando 218</p> <p>37 Mitch Parker 224</p> <p>38 Stuart Peck 231</p> <p>39 Carlos Perez 236</p> <p>40 Quiessence Phillips 242</p> <p>41 Lauren Proehl 248</p> <p>42 Josh Rickard 255</p> <p>43 Megan Roddie 266</p> <p>44 Jason Schorr 270</p> <p>45 Chris Sistrunk 274</p> <p>46 Jayson E. Street 280</p> <p>47 Michael Tanji 286</p> <p>48 Ronnie Tokazowski 294</p> <p>49 Ashley Tolbert 298</p> <p>50 Ismael Valenzuela 304</p> <p>51 Dave Venable 321</p> <p>52 Robert "TProphet" Walker 326</p> <p>53 Jake Williams 334</p> <p>54 Robert Willis 340</p>
<p><b>MARCUS J. CAREY</b> is a cybersecurity researcher and inventor with patents in cryptography and cybersecurity and more than 25 years of experience in protecting the public, private, and government sectors. He was the Founder and CEO of Threatcare, which was acquired by ReliaQuest. Follow Marcus on Twitter at @marcusjcarey. <p><b>JENNIFER JIN</b> graduated from the University of Texas at Austin in 2017 and started her first job at Threatcare soon after. She became Threatcare's Head of Communications and Marketing before Threatcare was acquired by ReliaQuest. Jennifer helped host the very first Tribe of Hackers Summit and is the co-author of <i>Tribe of Hackers</i>. Follow Jennifer on Twitter at @jen_jin.
<p><b>"TRIBE OF HACKERS" RETURNS—PROVIDING THE BEST ADVICE ON CYBERSECURITY BLUE TEAMS FROM SOME OF THE MOST TRUSTED NAMES IN THE INDUSTRY!</b> <p>Cybersecurity blue teams are an organization's core defense to assess and protect against vulnerabilities, finding weaknesses before hackers do and adapting on the fly to fight back during incidents. From the authors who brought you the bestselling <i>Tribe of Hackers comes Tribe of Hackers Blue Team</i>, a collection of invaluable real-world insights from the world's leading cybersecurity experts. This book offers perspectives on cybersecurity blue team issues including how to learn and practice blue team skills, how to communicate with and manage non-technical executive expectations, and where to start if you're rebuilding from a primitive security infrastructure. <p>Top blue teamers including Danny Akacki, Amanda Berlin, Sami Laiho, Bright Gameli Mawudor, Alyssa Miller, Stuart Peck, Jayson E. Street, and Jake Williams share their best blue team tips and strategies, describe the toughest challenges they've faced, and reveal what they've learned along the way. Inside, you'll find practical advice on identifying the core capabilities you need, rewarding good blue team work, and measuring blue team success. This is a must-read for anyone involved in or aspiring to be a blue teamer or to lead a blue team. <p><i>Tribe of Hackers Blue Team</i> answers questions such as: <ul> <li><b>What are some of the key strengths of an incident response program?</b></li> <li><b>What are some core metrics that a blue team can use to build, measure, and maintain a successful information security program?</b></li> <li><b>What is the most bang-for-your-buck security control?</b></li> <li><b>How do you engage all the different units of an organization to maximize defense?</b></li> <li><b>What strategies do you use to communicate the threats you encounter to non-technical decision-makers?</b></li> <li><b>What framework aligns the blue team's activities with regulatory compliance requirements?</b></li> </ul>

Diese Produkte könnten Sie auch interessieren:

MDX Solutions
MDX Solutions
von: George Spofford, Sivakumar Harinath, Christopher Webb, Dylan Hai Huang, Francesco Civardi
PDF ebook
53,99 €
Concept Data Analysis
Concept Data Analysis
von: Claudio Carpineto, Giovanni Romano
PDF ebook
107,99 €
Handbook of Virtual Humans
Handbook of Virtual Humans
von: Nadia Magnenat-Thalmann, Daniel Thalmann
PDF ebook
150,99 €