Professional Red Teaming

Professional Red Teaming: Conducting Successful Cybersecurity Engagements

This book is intended as a resource for those who want to conduct professional red teaming, as well as for those who use their services. The text is not intended to teach you how to hack a computer or organization, but rather how to do it well and in a way that results in better organization security. It takes a lot more than sweet hacking skills to perform offensive security assessments. Whether you are looking to employ ethical hackers, work with them, or are one, after reading this book you should understand what is required to be successful at leveraging cyber threat emulation to mitigate risk.

Leave a Reply

Your email address will not be published. Required fields are marked *

Rating*

For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

I agree to these terms.