product
7113960Adversary Emulation with MITRE ATT&CKhttps://www.gandhi.com.mx/adversary-emulation-with-mitre-att-ck-9781098143725/phttps://gandhi.vtexassets.com/arquivos/ids/6666279/image.jpg?v=638826723656530000490681MXNOReilly MediaInStock/Ebooks/<p>By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics advanced persistent threat (APT) tactics, techniques, and procedures (TTPs). This comprehensive guide introduces an empirical approach with strategies and processes collected over a decade of experience in the cybersecurity field. Youll learn to assess resilience against coordinated and stealthy threat actors capable of harming an organization.</p><p>Author Drinor Selmanaj demonstrates adversary emulation for offensive operators and defenders using practical examples and exercises that actively model adversary behavior. Each emulation plan includes different hands-on scenarios, such as smash-and-grab or slow-and-deliberate. This book uses the MITRE ATT&CK knowledge base as a foundation to describe and categorize TTPs based on real-world observations, and provides a common language thats standardized and accessible to everyone.</p><ul><li><p>Map Cyber Threat Intelligence to ATT&CK</p><p>Define Adversary Emulation goals and objectives</p><p>Research Adversary Emulation TTPs using ATT&CK knowledge base</p><p>Plan Adversary Emulation activity</p><p>Implement Adversary tradecraft</p><p>Conduct Adversary Emulation</p><p>Communicate Adversary Emulation findings</p><p>Automate Adversary Emulation to support repeatable testing</p><p>Execute FIN6, APT3, and APT29 emulation plans</p></li></ul>...6780580Adversary Emulation with MITRE ATT&CK490681https://www.gandhi.com.mx/adversary-emulation-with-mitre-att-ck-9781098143725/phttps://gandhi.vtexassets.com/arquivos/ids/6666279/image.jpg?v=638826723656530000InStockMXN99999DIEbook20249781098143725_W3siaWQiOiJjZDdjZjA0OC1iYzZjLTQ4MjUtOTU2NS00YmUwMDk3ZmFjYzkiLCJsaXN0UHJpY2UiOjY4MSwiZGlzY291bnQiOjE5MSwic2VsbGluZ1ByaWNlIjo0OTAsImluY2x1ZGVzVGF4Ijp0cnVlLCJwcmljZVR5cGUiOiJXaG9sZXNhbGUiLCJjdXJyZW5jeSI6Ik1YTiIsImZyb20iOiIyMDI0LTExLTI2VDE3OjAwOjAwWiIsInJlZ2lvbiI6Ik1YIiwiaXNQcmVvcmRlciI6ZmFsc2V9XQ==9781098143725_<p>By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics advanced persistent threat (APT) tactics, techniques, and procedures (TTPs). This comprehensive guide introduces an empirical approach with strategies and processes collected over a decade of experience in the cybersecurity field. Youll learn to assess resilience against coordinated and stealthy threat actors capable of harming an organization.</p><p>Author Drinor Selmanaj demonstrates adversary emulation for offensive operators and defenders using practical examples and exercises that actively model adversary behavior. Each emulation plan includes different hands-on scenarios, such as smash-and-grab or slow-and-deliberate. This book uses the MITRE ATT&CK knowledge base as a foundation to describe and categorize TTPs based on real-world observations, and provides a common language thats standardized and accessible to everyone.</p><ul><li><p>Map Cyber Threat Intelligence to ATT&CK</p><p>Define Adversary Emulation goals and objectives</p><p>Research Adversary Emulation TTPs using ATT&CK knowledge base</p><p>Plan Adversary Emulation activity</p><p>Implement Adversary tradecraft</p><p>Conduct Adversary Emulation</p><p>Communicate Adversary Emulation findings</p><p>Automate Adversary Emulation to support repeatable testing</p><p>Execute FIN6, APT3, and APT29 emulation plans</p></li></ul>...9781098143725_OReilly Medialibro_electonico_9781098143725_9781098143725Drinor SelmanajInglésMéxicohttps://getbook.kobo.com/koboid-prod-public/oreilly-epub-e65d6733-5f70-41bf-831b-bd15f27dae35.epub2024-04-25T00:00:00+00:00OReilly Media