Jump to content
Click or hover over image to zoom in

Red and blue attack and defense: Building a real combat network security defense system

(1 review)
$9
This is a book from the perspective of the red team, the blue team, the purple team to comprehensively explain how to carry out the red and blue attack and defense practice, is a summary of the experience of the Qi 'an principal service team for many years in the service of various large government and enterprise organizations.
This book comprehensively explains the breakthrough of defense system from the perspective of blue team, the construction of defense system from the perspective of red team, and the actual attack and defense drill organization from the perspective of Purple team. It systematically introduces the process, method, means, ability and strategy that all parties should master in the Red and blue attack and defense actual drill, including comprehensive technical details and a large number of attack and defense practice cases.
The first part (Chapter 1) is the basis of Red versus Blue
First of all, this paper expounds the reasons for conducting actual combat offensive and defensive drills and the development status of actual combat offensive and defensive drills. Secondly, the definition and evolution trend of red team, basketball team and purple team are introduced. Finally, the weak links exposed in actual combat attack and defense drills and how to establish a real combat safety system are summarized.
Part Two (Chapter 2-5) Defense system breakthrough from the perspective of Blue Team
It explains the four stages of the blue team's defense breakthrough, eight attack means, various necessary abilities, and nearly 10 classic cases using different attack strategies.
The third part (Chapter 6~10) Defense system construction from the perspective of Red team
It explains the four implementation stages, eight defensive strategies, five types of defensive means and five types of key equipment of the Red team's defense system construction, as well as the classic defensive cases from major government and enterprise organizations.
The fourth part (Chapter 11~13) The actual combat offensive and defensive drill organization from the perspective of Purple Team
First of all, from the aspects of drill organizational elements, organizational form, organizational key and risk avoidance measures, this paper describes how to organize a real combat attack and defense drill as an organizer. Then, it introduces the work content of the organizer in detail from five stages: organizational planning, preliminary preparation, real combat attack and defense drill, emergency drill and drill summary. Finally, the overall planning and organization process of sand table exercise after the drill is finished are introduced.
About the author
Chian Principal Service team
Team is a team offensive and defensive technology as the core, under the big, the cloud data is focused on the threat detection and response, advisory planning, threat detection, offensive and defensive drills, sustained response, warning notices, safe operation and a series of actual combat service capabilities, can provide customers with the whole cycle security services professional network security and emergency response team.
The team is the leading security service team in China with a business scope covering the whole country. The service objects include network security regulators, leading enterprises and industry units in various industries and fields such as the Party and government, finance, operators, energy, central enterprises, media and civil aviation.
The team has a large number of experienced network security attack and defense experts, gathered domestic outstanding network security talents, created a number of important security cases in the forefront of the industry, and for many years in the actual combat attack and defense drill has achieved brilliant achievements in attack and defense, has become the leading team of attack and defense drill service.
The team has a Stargazing laboratory team that focuses on Internet application vulnerability mining and attack and defense research, and a Z-TEAM team that plays an important role in actual combat attack and defense drills and is good at organizing and implementing penetration attacks, providing strong technical support for network security services. Z-TEAM has developed several sets of practical technology warfare methods and supporting tools in the continuous exercise of real network confrontation. Especially in the aspects of Web attack and defense, social worker penetration, Intranet penetration and simulated APT attack, the team has solid technical strength and flexible technology warfare methods, and its actual combat ability is highly recognized by the industry.

 Share

About Red and blue attack and defense: Building a real combat network security defense system

This is a book from the perspective of the red team, the blue team, the purple team to comprehensively explain how to carry out the red and blue attack and defense practice, is a summary of the experience of the Qi 'an principal service team for many years in the service of various large government and enterprise organizations.

This book comprehensively explains the breakthrough of defense system from the perspective of blue team, the construction of defense system from the perspective of red team, and the actual attack and defense drill organization from the perspective of Purple team. It systematically introduces the process, method, means, ability and strategy that all parties should master in the Red and blue attack and defense actual drill, including comprehensive technical details and a large number of attack and defense practice cases.

The first part (Chapter 1) is the basis of Red versus Blue

First of all, this paper expounds the reasons for conducting actual combat offensive and defensive drills and the development status of actual combat offensive and defensive drills. Secondly, the definition and evolution trend of red team, basketball team and purple team are introduced. Finally, the weak links exposed in actual combat attack and defense drills and how to establish a real combat safety system are summarized.

Part Two (Chapter 2-5) Defense system breakthrough from the perspective of Blue Team

It explains the four stages of the blue team's defense breakthrough, eight attack means, various necessary abilities, and nearly 10 classic cases using different attack strategies.

The third part (Chapter 6~10) Defense system construction from the perspective of Red team

It explains the four implementation stages, eight defensive strategies, five types of defensive means and five types of key equipment of the Red team's defense system construction, as well as the classic defensive cases from major government and enterprise organizations.

The fourth part (Chapter 11~13) The actual combat offensive and defensive drill organization from the perspective of Purple Team

First of all, from the aspects of drill organizational elements, organizational form, organizational key and risk avoidance measures, this paper describes how to organize a real combat attack and defense drill as an organizer. Then, it introduces the work content of the organizer in detail from five stages: organizational planning, preliminary preparation, real combat attack and defense drill, emergency drill and drill summary. Finally, the overall planning and organization process of sand table exercise after the drill is finished are introduced.

About the author

Chian Principal Service team

Team is a team offensive and defensive technology as the core, under the big, the cloud data is focused on the threat detection and response, advisory planning, threat detection, offensive and defensive drills, sustained response, warning notices, safe operation and a series of actual combat service capabilities, can provide customers with the whole cycle security services professional network security and emergency response team.

The team is the leading security service team in China with a business scope covering the whole country. The service objects include network security regulators, leading enterprises and industry units in various industries and fields such as the Party and government, finance, operators, energy, central enterprises, media and civil aviation.

The team has a large number of experienced network security attack and defense experts, gathered domestic outstanding network security talents, created a number of important security cases in the forefront of the industry, and for many years in the actual combat attack and defense drill has achieved brilliant achievements in attack and defense, has become the leading team of attack and defense drill service.

The team has a Stargazing laboratory team that focuses on Internet application vulnerability mining and attack and defense research, and a Z-TEAM team that plays an important role in actual combat attack and defense drills and is good at organizing and implementing penetration attacks, providing strong technical support for network security services. Z-TEAM has developed several sets of practical technology warfare methods and supporting tools in the continuous exercise of real network confrontation. Especially in the aspects of Web attack and defense, social worker penetration, Intranet penetration and simulated APT attack, the team has solid technical strength and flexible technology warfare methods, and its actual combat ability is highly recognized by the industry.image.png


×
×
  • Create New...