Sign up to save your library
With an OverDrive account, you can save your favorite libraries for at-a-glance information about availability. Find out more about OverDrive accounts.
Find this title in Libby, the library reading app by OverDrive.

Search for a digital library with this title
Title found at these libraries:
Library Name | Distance |
---|---|
Loading... |
This practical introduction to collaborative security testing, or “purple teaming,” is a hands-on, lab-based guide to key methodologies for cybersecurity practitioners in any field.
Many organizations have chosen to forgo traditional security tests in favor of collaborative assessments – or “purple team” tests, for the way they combine offensive (“red team”) and defensive (“blue team”) elements – in which offensive and defensive teams work together to measure and improve the organization’s resilience to attacks.
Practical Purple Teaming outlines common purple team methodologies, offensive and defensive frameworks, and real-world threat research to craft realistic test cases. Readers will use a dedicated lab environment to execute attacks common to the modern threat landscape, then consider ways of tuning defenses to detect and prevent the activity.
Along the way, they’ll be introduced to a number of open-source tools for emulating enterprise environments, automating attacks, crafting intelligent alerts, and more. Covers numerous free tools readers could use in their own purple team exercises, offensive frameworks, and defensive technologies.
Many organizations have chosen to forgo traditional security tests in favor of collaborative assessments – or “purple team” tests, for the way they combine offensive (“red team”) and defensive (“blue team”) elements – in which offensive and defensive teams work together to measure and improve the organization’s resilience to attacks.
Practical Purple Teaming outlines common purple team methodologies, offensive and defensive frameworks, and real-world threat research to craft realistic test cases. Readers will use a dedicated lab environment to execute attacks common to the modern threat landscape, then consider ways of tuning defenses to detect and prevent the activity.
Along the way, they’ll be introduced to a number of open-source tools for emulating enterprise environments, automating attacks, crafting intelligent alerts, and more. Covers numerous free tools readers could use in their own purple team exercises, offensive frameworks, and defensive technologies.