reklama - zainteresowany?

Introduction to Kali Purple. An Enhanced Approach for the Protection of Critical IT Assets - Helion

Introduction to Kali Purple. An Enhanced Approach for the Protection of Critical IT Assets
ebook
Autor: Karl Lane
Tytuł oryginału: Introduction to Kali Purple. An Enhanced Approach for the Protection of Critical IT Assets
ISBN: 9781835087350
Format: ebook
Księgarnia: Helion

Cena książki: 159,00 zł

Książka będzie dostępna od grudnia 2023

Introduction to Kali Purple brings together Red Team tools from the Kali Linux OS and Blue Team tools commonly found within a Security Operations Center (SOC).
Your journey begins with an overview of today's cybersecurity services and their evolution. You'll gain an understanding of how Kali Purple can enhance training and support proof-of-concept scenarios for your technicians and analysts. Additionally, you will acquire the knowledge needed to develop a cyber defense system for SOHO services. This is demonstrated through the installation and configuration of supporting tools like virtual machines, the Java SDK, Elastic, and related software. The content covers traffic and log analysis using Arkime and Malcome, obfuscation techniques featuring Cyberchef, and intrusion detection through Suricata and Zeek.
The book introduces advanced features, including Security Incident Response with TheHive, Synapse, and Cortex Integration, digital forensics using Tracee Forensics software, and malware analysis. You will also explore Purple Team's contributions to social engineering and exploit development.
By the end of this book, you should have a comfortable and clear understanding of how this powerful suite of tools can be practically implemented in real-world scenarios.

Spis treści

Defensive Security with Kali Purple. Cybersecurity strategies using ELK Stack and Kali Linux eBook -- spis treści

  • 1. An Introduction to Cybersecurity
  • 2. Kali Linux and the Elk Stack
  • 3. Installing the Kali Purple Linux Environment
  • 4. Configuring the ELK Stack
  • 5. Sending Data to the ELK Stack
  • 6. Traffic and Log Analysis
  • 7. Intrusion Detection and Prevention Systems
  • 8. Security Incident and Response
  • 9. Digital Forensics
  • 10. Integrating the Red Team and External Tools
  • 11. Autopilot, Python, and NIST Control

Code, Publish & WebDesing by CATALIST.com.pl



(c) 2005-2024 CATALIST agencja interaktywna, znaki firmowe należą do wydawnictwa Helion S.A.