Secure CheckoutPersonal information is secured with SSL technology.
Free ShippingFree global shipping
No minimum order.
Red Teaming is can be described as a type of wargaming.In private business, penetration testers audit and test organization security, often in a secretive setting. The entire point of the Red Team is to see how weak or otherwise the organization’s security posture is. This course is particularly suited to CISO’s and CTO’s that need to learn how to build a successful Red Team, as well as budding cyber security professionals who would like to learn more about the world of information security.
- Teaches readers how to dentify systemic security issues based on the analysis of vulnerability and configuration data
- Demonstrates the key differences between Red Teaming and Penetration Testing
- Shows how to build a Red Team and how to identify different operational threat environments
Cyber Security professionals
2. The Typical Approach
3. Red Team Assessment
4. Elements for Success
5. Who Are We Up Against
6. Things to Keep in Mind
7. Composite Attacks
- No. of pages:
- © Syngress 2015
- 19th August 2015
- Paperback ISBN:
- eBook ISBN:
Henry Dalziel is a serial education entrepreneur, founder of Concise Ac Ltd, online cybersecurity blogger and e-book author. He writes for the Concise-Courses.com blog and has developed numerous cybersecurity continuing education courses and books. Concise Ac Ltd develops and distributes continuing education content [books and courses] for cybersecurity professionals seeking skill enhancement and career advancement. The company was recently accepted onto the UK Trade & Investment's (UKTI) Global Entrepreneur Programme (GEP).
Founder, Concise Ac Ltd, UK
"...contains quite a bit of information that should stimulate the thinking of those working on either attack or defense. The text is well written and supported with useful diagrams of the concepts." --Computing Reviews
"...It's a fast read that introduces the main things you need to keep in mind if you want to engage in red teaming, and offers a fresh perspective on the subject,…" --Help Net Security