Chang Tan
SKU: 9788196890315
ISBN: 9788196890315
eISBN: 9788196890346
Rights: Worldwide
Author Name: Chang Tan
Publishing Date: 31-Jan-2024
Dimension: 7.5*9.25 Inches
Binding: Paperback
Page Count: 306
Attackers have to be only right once, but just one mistake will permanently undo them.
KEY FEATURES
● Explore the nuances of strategic offensive and defensive cyber operations, mastering the art of digital warfare
● Develop and deploy advanced evasive techniques, creating and implementing implants on even the most secure systems
● Achieve operational security excellence by safeguarding secrets, resisting coercion, and effectively erasing digital traces
● Gain valuable insights from threat actor experiences, learning from both their accomplishments and mistakes for tactical advantage
● Synergize information warfare strategies, amplifying impact or mitigating damage through strategic integration
● Implement rootkit persistence, loading evasive code and applying threat actor techniques for sustained effectiveness
● Stay ahead of the curve by anticipating and adapting to the ever-evolving landscape of emerging cyber threats
● Comprehensive cyber preparedness guide, offering insights into effective strategies and tactics for navigating the digital battlefield
DESCRIPTION
The “Ultimate Cyberwarfare for Evasive Cyber Tactic” is an all-encompassing guide, meticulously unfolding across pivotal cybersecurity domains, providing a thorough overview of cyber warfare.The book begins by unraveling the tapestry of today's cyber landscape, exploring current threats, implementation strategies, and notable trends. From operational security triumphs to poignant case studies of failures, readers gain valuable insights through real-world case studies.
The book delves into the force-multiplying potential of the Information Warfare component, exploring its role in offensive cyber operations. From deciphering programming languages, tools, and frameworks to practical insights on setting up your own malware lab, this book equips readers with hands-on knowledge.
The subsequent chapters will immerse you in the world of proof-of-concept evasive malware and master the art of evasive adversarial tradecraft. Concluding with a forward-looking perspective, the book explores emerging threats and trends, making it an essential read for anyone passionate about understanding and navigating the complex terrain of cyber conflicts.
WHAT WILL YOU LEARN
● Explore historical insights into cyber conflicts, hacktivism, and notable asymmetric events
● Gain a concise overview of cyberwarfare, extracting key lessons from historical conflicts
● Dive into current cyber threats, dissecting their implementation strategies
● Navigate adversarial techniques and environments for a solid foundation and establish a robust malware development environment
● Explore the diverse world of programming languages, tools, and frameworks
● Hone skills in creating proof-of-concept evasive code and understanding tradecraft
● Master evasive tradecraft and techniques for covering tracks
WHO IS THIS BOOK FOR?
This book is designed to cater to a diverse audience, including cyber operators seeking skill enhancement, computer science students exploring practical applications, and penetration testers and red teamers refining offensive and defensive capabilities.
It is valuable for privacy advocates, lawyers, lawmakers, and legislators navigating the legal and regulatory aspects of cyber conflicts. Additionally, tech workers in the broader industry will find it beneficial to stay informed about evolving threats.
2. Notable Threats and Trends
3. Operational Security Successes and Failures
4. The Information Warfare Component
5. Programming Languages, Tools, and Frameworks
6. Setting Up Your Malware Lab
7. Proof-of-Concept Evasive Malware
8. Evasive Adversarial Tradecraft
9. Emerging Threats and Trends
Index
Chang Tan is a Certified MCSI MCD (Mosse Cybersecurity Institute Certified Code Deobfuscation Specialist), specializing in the reverse-engineering and deobfuscation of Advanced Persistent Threat Malware. He has a Bachelor's degree in Accounting from the University of Nevada, Las Vegas, and is currently pursuing a second degree in Finance. Chang has been working with Daniel M. Kelley's Cybersecurity and Growth Organization and scamkillers.org. He is actively involved in activities with DEFCON Group 702 and the C2Society Non-Profit Organization, where on a quarter-annual basis, they hold The Petting Zoo Capture-the-Flag event.
____________________________________________________________________________________________
____________________________________________________________________________________________
Ken is an IT and cybersecurity professional with over 20 years of experience. He has trained over a million people globally in cybersecurity skills through his online courses.
As a co-author of the international best-selling book, Hack the Cybersecurity Interview, Ken has helped thousands of people secure their dream cybersecurity Job.
He has also won numerous cybersecurity awards, including the SC Media Outstanding Educator award, the Women's Society of Cyberjutsu Cyber Champion award, and the Global Cybersecurity 40 under 40 award (2x winner). Ken holds a graduate degree in cybersecurity and information assurance from Western Governors University, accompanied by industry certifications such as the CCSK, CEH, and CHFI.
Beyond his professional endeavors, Ken also volunteers with organizations like Black Girls Hack, Minorities in Cybersecurity, and Breaking Barriers Women in Cybersecurity. From 2020 to 2022, he successfully hosted the Cyber Life television show, which reached over 2 million people globally.
Currently, Ken is the host of the Cyber Life podcast and runs a YouTube channel where he shares free cybersecurity training and conducts interviews with industry leaders. His ultimate goal is to help just one more person be successful in their cybersecurity career, contributing to making the world a better place.