Description
By: Casey Erdmann
A comprehensive, hacker-written guide for security professionals looking to plan and implement real-world penetration testing, or “red team,” operations.
Based on the author’s popular online course, Offensive Security turns offensive security theory into practice, equipping security professionals with the hands-on knowledge they’ll need to carry out red team operations in the field.
Unlike other offensive security books, this title explains the “how” of red team operations, embracing the hacker spirit by teaching techniques and practices often kept under wraps in the industry. Erdmann also covers tooling and infrastructure, two key components of red team operations; comparable resources tend to focus on one or the other and lack specifics on implementation.
The book begins by covering how to write custom tools then teaches readers how to engineer the infrastructure to effectively use those tools. Projects and screenshots throughout help reinforce learning, and the conversational tone is approachable and engaging.
Erdmann emphasizes that readers can apply the skills they acquire here across numerous IT areas, as the technologies and procedures covered are applicable to defensive security or even neutral IT roles.
A comprehensive, hacker-written guide for security professionals looking to plan and implement real-world penetration testing, or “red team,” operations.
Based on the author’s popular online course, Offensive Security turns offensive security theory into practice, equipping security professionals with the hands-on knowledge they’ll need to carry out red team operations in the field.
Unlike other offensive security books, this title explains the “how” of red team operations, embracing the hacker spirit by teaching techniques and practices often kept under wraps in the industry. Erdmann also covers tooling and infrastructure, two key components of red team operations; comparable resources tend to focus on one or the other and lack specifics on implementation.
The book begins by covering how to write custom tools then teaches readers how to engineer the infrastructure to effectively use those tools. Projects and screenshots throughout help reinforce learning, and the conversational tone is approachable and engaging.
Erdmann emphasizes that readers can apply the skills they acquire here across numerous IT areas, as the technologies and procedures covered are applicable to defensive security or even neutral IT roles.
You may also like
Top Trending
Dog Man 14: Dog Man: Big Jim Believes: A Graphic Novel (Dog Man #14)
Sale priceHK$85.00
Regular priceHK$150.00
In stock
Press Start! #17 The Super Jump Between Worlds! (Branches)
Sale priceHK$55.00
Regular priceHK$98.00
In stock
Darkstalker: A Graphic Novel (Wings of Fire: Legends Graphic Novel)
Sale priceHK$99.00
Regular priceHK$154.00
In stock
Harry Potter #4 and the Goblet of Fire (Interactive Illustrated Edition)
Sale priceHK$299.00
Regular priceHK$630.00
In stock
InvestiGators: Agents of S.U.I.T. #02: From Badger to Worse
Sale priceHK$79.00
Regular priceHK$99.00
In stock
Percy Jackson and the Olympians 5 Book Paperback Boxed Set (w/poster)
Sale priceHK$288.00
Regular priceHK$450.00
In stock