Skip to main content
  • Book
  • © 2019

Professional Red Teaming

Conducting Successful Cybersecurity Engagements

Apress

Authors:

  • Explains how carrying out cybersecurity engagements involves more than exploiting computers, executing scripts, or utilizing tools

  • Introduces you to counter advanced persistent threat red teaming (CAPTR teaming) as a reverse red teaming methodology to address challenges faced from advanced persistent threats (APTs)

  • Authored by a seasoned offensive security practitioner and published academic who brings a practical, real-world, and tempered approach to cyber operations

Buy it now

Buying options

eBook USD 34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (15 chapters)

  1. Front Matter

    Pages i-xix
  2. Red Teams in Cyberspace

    • Jacob G. Oakley
    Pages 1-14
  3. Why Human Hackers?

    • Jacob G. Oakley
    Pages 15-28
  4. The State of Modern Offensive Security

    • Jacob G. Oakley
    Pages 29-41
  5. Shaping

    • Jacob G. Oakley
    Pages 43-55
  6. Rules of Engagement

    • Jacob G. Oakley
    Pages 57-71
  7. Executing

    • Jacob G. Oakley
    Pages 73-88
  8. Reporting

    • Jacob G. Oakley
    Pages 89-103
  9. Purple Teaming

    • Jacob G. Oakley
    Pages 105-115
  10. Counter-APT Red Teaming

    • Jacob G. Oakley
    Pages 117-128
  11. Outcome-oriented Scoping

    • Jacob G. Oakley
    Pages 129-138
  12. Initialization Perspectives

    • Jacob G. Oakley
    Pages 139-155
  13. Reverse Red Teaming

    • Jacob G. Oakley
    Pages 157-169
  14. Evaluating Offensive Security Processes

    • Jacob G. Oakley
    Pages 171-179
  15. Experimentation

    • Jacob G. Oakley
    Pages 181-193
  16. Validation

    • Jacob G. Oakley
    Pages 195-203
  17. Back Matter

    Pages 205-210

About this book

Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools.

Professional Red Teaming introduces you to foundational offensive security concepts. The importance of assessments and ethical hacking is highlighted, and automated assessment technologies are addressed. The state of modern offensive security is discussed in terms of the unique challenges present in professional red teaming.

Best practices and operational tradecraft are covered so you feel comfortable in the shaping and carrying out of red team engagements. Anecdotes from actual operations and example scenarios illustrate key concepts and cement a practical understanding of the red team process.

You also are introduced to counter advanced persistent threat red teaming (CAPTR teaming). This is a reverse red teaming methodology aimed at specifically addressing the challenges faced from advanced persistent threats (APTs) by the organizations they target and the offensive security professionals trying to mitigate them.


What You’ll Learn

  • Understand the challenges faced by offensive security assessments
  • Incorporate or conduct red teaming to better mitigate cyber threats
  • Initiate a successful engagement
  • Get introduced to counter-APT red teaming (CAPTR)
  • Evaluate offensive security processes


Who This Book Is For

Offensive security assessors and those who want a working knowledge of the process, its challenges, and its benefits. Current professionals will gain tradecraft and operational insight and non-technical readers will gain a high-level perspective of what it means to provide and be a customer of red team assessments.

Authors and Affiliations

  • Owens Cross Roads, USA

    Jacob G. Oakley

About the author

Jacob G. Oakley spent over seven years in the US Marines and was one of the founding members of the operational arm of the Marine Corps Forces Cyberspace Command at NSA, Ft. Meade. He left that unit as the senior Marine Corps operator and a division technical lead. After his enlistment he wrote and taught an advanced computer operations course, eventually returning back to mission support at Ft. Meade. He later left government contracting to do threat emulation and red teaming at a private company for commercial clients, serving as principal penetration tester and director of penetration testing and cyber operations. He is currently working as a cyber SME for a government customer. He completed his doctorate in IT at Towson University, researching and developing offensive cybersecurity methods and is the technical reviewer of the book Cyber Operations, second edition, by Mike O’Leary.

Bibliographic Information

  • Book Title: Professional Red Teaming

  • Book Subtitle: Conducting Successful Cybersecurity Engagements

  • Authors: Jacob G. Oakley

  • DOI: https://doi.org/10.1007/978-1-4842-4309-1

  • Publisher: Apress Berkeley, CA

  • eBook Packages: Professional and Applied Computing, Professional and Applied Computing (R0), Apress Access Books

  • Copyright Information: Jacob G. Oakley 2019

  • Softcover ISBN: 978-1-4842-4308-4Published: 09 March 2019

  • eBook ISBN: 978-1-4842-4309-1Published: 08 March 2019

  • Edition Number: 1

  • Number of Pages: XIX, 210

  • Number of Illustrations: 46 b/w illustrations

  • Topics: Security

Buy it now

Buying options

eBook USD 34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access