Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

CyberSecurity Summary

Cybersecurity Attacks - Red Team Strategies

19 Jan 2025

Description

This Book is a comprehensive guide to building and managing a red team program within an organization. The text covers essential topics such as defining the mission of a red team, gaining leadership support, building a program from scratch or inheriting an existing one, and managing and assessing the team. It explores the importance of "homefield advantage" and the collaborative approach between red and blue teams. The book provides numerous examples of real-world adversary tactics and techniques, including phishing attacks, credential hunting, and abusing logging and tracing to steal information. The text delves into the use of graph databases and attack graphs to map out the organization's assets and relationships, and it emphasizes the importance of security monitoring and alerting to detect and respond to threats effectively. Finally, the book discusses blue team tactics that red teamers should be familiar with, including centralized monitoring solutions like osquery and the Elasticsearch Stack.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summaryGet the Book now from Amazon:https://www.amazon.com/Cybersecurity-Attacks-Strategies-practical-penetration/dp/1838828869?&linkCode=ll1&tag=cvthunderx-20&linkId=5d644c69621ad15774cfe3aea7ce0570&language=en_US&ref_=as_li_ss_tlDiscover our free courses in tech and cybersecurity, Start learning today:https://linktr.ee/cybercode_academy

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.