reklama - zainteresowany?

Introduction to Kali Purple. An Enhanced Approach for the Protection of Critical IT Assets - Helion

Introduction to Kali Purple. An Enhanced Approach for the Protection of Critical IT Assets
ebook
Autor: Karl Lane
Tytuł oryginału: Introduction to Kali Purple. An Enhanced Approach for the Protection of Critical IT Assets
ISBN: 9781835087350
Format: ebook
Księgarnia: Helion

Cena książki: 159,00 zł

Książka będzie dostępna od grudnia 2023

Introduction to Kali Purple brings together Red Team tools from the Kali Linux OS and Blue Team tools commonly found within a Security Operations Center (SOC).
Your journey begins with an overview of today's cybersecurity services and their evolution. You'll gain an understanding of how Kali Purple can enhance training and support proof-of-concept scenarios for your technicians and analysts. Additionally, you will acquire the knowledge needed to develop a cyber defense system for SOHO services. This is demonstrated through the installation and configuration of supporting tools like virtual machines, the Java SDK, Elastic, and related software. The content covers traffic and log analysis using Arkime and Malcome, obfuscation techniques featuring Cyberchef, and intrusion detection through Suricata and Zeek.
The book introduces advanced features, including Security Incident Response with TheHive, Synapse, and Cortex Integration, digital forensics using Tracee Forensics software, and malware analysis. You will also explore Purple Team's contributions to social engineering and exploit development.
By the end of this book, you should have a comfortable and clear understanding of how this powerful suite of tools can be practically implemented in real-world scenarios.

Spis treści

Introduction to Kali Purple. Protect critical IT assets with an all-in-one approach to cybersecurity eBook -- spis treści

  • 1. Introduction to Cybersecurity
  • 2. Kali Linux and Elk Stack
  • 3. Installing Kali Purple Linux Variant
  • 4. Configuring the ELK Stack
  • 5. Configuring Agents and Monitoring
  • 6. Purple Traffic and Log Analysis
  • 7. Purple for Intrusion Detection
  • 8. Purple for Security Incident Response
  • 9. Digital Forensics
  • 10. Kali Autopilot and Purple Scripting
  • 11. Integration of External and Red Team Tools

Code, Publish & WebDesing by CATALIST.com.pl



(c) 2005-2024 CATALIST agencja interaktywna, znaki firmowe należą do wydawnictwa Helion S.A.