Chang Tan
SKU: 9788196890315
ISBN: 9788196890315
eISBN: 9788196890346
Rights: Worldwide
Author Name: Chang Tan
Publishing Date: 31-Jan-2024
Dimension: 7.5*9.25 Inches
Binding: Paperback
Page Count: 306
Attackers have to be only right once, but just one mistake will permanently undo them.
KEY FEATURES
Explore the nuances of strategic offensive and defensive cyber operations, mastering the art of digital warfare
Develop and deploy advanced evasive techniques, creating and implementing implants on even the most secure systems
Achieve operational security excellence by safeguarding secrets, resisting coercion, and effectively erasing digital traces
Gain valuable insights from threat actor experiences, learning from both their accomplishments and mistakes for tactical advantage
Synergize information warfare strategies, amplifying impact or mitigating damage through strategic integration
Implement rootkit persistence, loading evasive code and applying threat actor techniques for sustained effectiveness
Stay ahead of the curve by anticipating and adapting to the everevolving landscape of emerging cyber threats
Comprehensive cyber preparedness guide, offering insights into effective strategies and tactics for navigating the digital battlefield
DESCRIPTION
The Ultimate Cyberwarfare for Evasive Cyber Tactic is an allencompassing guide, meticulously unfolding across pivotal cybersecurity domains, providing a thorough overview of cyber warfare.The book begins by unraveling the tapestry of today's cyber landscape, exploring current threats, implementation strategies, and notable trends. From operational security triumphs to poignant case studies of failures, readers gain valuable insights through realworld case studies.
The book delves into the forcemultiplying potential of the Information Warfare component, exploring its role in offensive cyber operations. From deciphering programming languages, tools, and frameworks to practical insights on setting up your own malware lab, this book equips readers with handson knowledge.
The subsequent chapters will immerse you in the world of proofofconcept evasive malware and master the art of evasive adversarial tradecraft. Concluding with a forwardlooking perspective, the book explores emerging threats and trends, making it an essential read for anyone passionate about understanding and navigating the complex terrain of cyber conflicts.
WHAT WILL YOU LEARN
Explore historical insights into cyber conflicts, hacktivism, and notable asymmetric events
Gain a concise overview of cyberwarfare, extracting key lessons from historical conflicts
Dive into current cyber threats, dissecting their implementation strategies
Navigate adversarial techniques and environments for a solid foundation and establish a robust malware development environment
Explore the diverse world of programming languages, tools, and frameworks
Hone skills in creating proofofconcept evasive code and understanding tradecraft
Master evasive tradecraft and techniques for covering tracks
WHO IS THIS BOOK FOR?
This book is designed to cater to a diverse audience, including cyber operators seeking skill enhancement, computer science students exploring practical applications, and penetration testers and red teamers refining offensive and defensive capabilities.
It is valuable for privacy advocates, lawyers, lawmakers, and legislators navigating the legal and regulatory aspects of cyber conflicts. Additionally, tech workers in the broader industry will find it beneficial to stay informed about evolving threats.
2. Notable Threats and Trends
3. Operational Security Successes and Failures
4. The Information Warfare Component
5. Programming Languages, Tools, and Frameworks
6. Setting Up Your Malware Lab
7. ProofofConcept Evasive Malware
8. Evasive Adversarial Tradecraft
9. Emerging Threats and Trends
Index
Chang Tan is a Certified MCSI MCD (Mosse Cybersecurity Institute Certified Code Deobfuscation Specialist), specializing in the reverseengineering and deobfuscation of Advanced Persistent Threat Malware. He has a Bachelor's degree in Accounting from the University of Nevada, Las Vegas, and is currently pursuing a second degree in Finance. Chang has been working with Daniel M. Kelley's Cybersecurity and Growth Organization and scamkillers.org. He is actively involved in activities with DEFCON Group 702 and the C2Society NonProfit Organization, where on a quarterannual basis, they hold The Petting Zoo CapturetheFlag event.
____________________________________________________________________________________________
____________________________________________________________________________________________
Ken is an IT and cybersecurity professional with over 20 years of experience. He has trained over a million people globally in cybersecurity skills through his online courses.
As a coauthor of the international bestselling book, Hack the Cybersecurity Interview, Ken has helped thousands of people secure their dream cybersecurity Job.
He has also won numerous cybersecurity awards, including the SC Media Outstanding Educator award, the Women's Society of Cyberjutsu Cyber Champion award, and the Global Cybersecurity 40 under 40 award (2x winner). Ken holds a graduate degree in cybersecurity and information assurance from Western Governors University, accompanied by industry certifications such as the CCSK, CEH, and CHFI.
Beyond his professional endeavors, Ken also volunteers with organizations like Black Girls Hack, Minorities in Cybersecurity, and Breaking Barriers Women in Cybersecurity. From 2020 to 2022, he successfully hosted the Cyber Life television show, which reached over 2 million people globally.
Currently, Ken is the host of the Cyber Life podcast and runs a YouTube channel where he shares free cybersecurity training and conducts interviews with industry leaders. His ultimate goal is to help just one more person be successful in their cybersecurity career, contributing to making the world a better place.