Introduction to Kali Purple. An Enhanced Approach for the Protection of Critical IT Assets - Helion
Tytuł oryginału: Introduction to Kali Purple. An Enhanced Approach for the Protection of Critical IT Assets
ISBN: 9781835087350
Format: ebook
Księgarnia: Helion
Cena książki: 159,00 zł
Książka będzie dostępna od grudnia 2023
Introduction to Kali Purple brings together Red Team tools from the Kali Linux OS and Blue Team tools commonly found within a Security Operations Center (SOC).
Your journey begins with an overview of today's cybersecurity services and their evolution. You'll gain an understanding of how Kali Purple can enhance training and support proof-of-concept scenarios for your technicians and analysts. Additionally, you will acquire the knowledge needed to develop a cyber defense system for SOHO services. This is demonstrated through the installation and configuration of supporting tools like virtual machines, the Java SDK, Elastic, and related software. The content covers traffic and log analysis using Arkime and Malcome, obfuscation techniques featuring Cyberchef, and intrusion detection through Suricata and Zeek.
The book introduces advanced features, including Security Incident Response with TheHive, Synapse, and Cortex Integration, digital forensics using Tracee Forensics software, and malware analysis. You will also explore Purple Team's contributions to social engineering and exploit development.
By the end of this book, you should have a comfortable and clear understanding of how this powerful suite of tools can be practically implemented in real-world scenarios.
Zobacz także:
- Windows Media Center. Domowe centrum rozrywki 66,67 zł, (8,00 zł -88%)
- Ruby on Rails. Ćwiczenia 18,75 zł, (3,00 zł -84%)
- Przywództwo w świecie VUCA. Jak być skutecznym liderem w niepewnym środowisku 58,64 zł, (12,90 zł -78%)
- Scrum. O zwinnym zarządzaniu projektami. Wydanie II rozszerzone 58,64 zł, (12,90 zł -78%)
- Od hierarchii do turkusu, czyli jak zarządzać w XXI wieku 58,64 zł, (12,90 zł -78%)
Spis treści
Defensive Security with Kali Purple. Cybersecurity strategies using ELK Stack and Kali Linux eBook -- spis treści
- 1. An Introduction to Cybersecurity
- 2. Kali Linux and the Elk Stack
- 3. Installing the Kali Purple Linux Environment
- 4. Configuring the ELK Stack
- 5. Sending Data to the ELK Stack
- 6. Traffic and Log Analysis
- 7. Intrusion Detection and Prevention Systems
- 8. Security Incident and Response
- 9. Digital Forensics
- 10. Integrating the Red Team and External Tools
- 11. Autopilot, Python, and NIST Control