Leverage the offensive power of Kali Linux with the defensive power of a security operations center (SOC) for cybersecurity business and training purposes Key Features Gain practical experience in defensive security methods Learn the correct process for acquiring, installing, and configuring a robust SOC from home Understand how to train junior technicians and analysts through live demonstrations of real-world cybersecurity utilities Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionIntroduction to Kali Purple brings together Red Team tools from the Kali Linux OS and Blue Team tools commonly found within a security operations center (SOC). Starting with an overview of today's cybersecurity services and their evolution, you'll gain an understanding of how Kali Purple can enhance training and support proof-of-concept scenarios for your technicians and analysts. After getting to grips with the basics, you’ll acquire the knowledge needed to develop a cyber defense system for SOHO services. This is demonstrated through the installation and configuration of supporting tools like virtual machines, the Java SDK, Elastic, and related software. The book also covers traffic and log analysis using Arkime and Malcome, obfuscation techniques featuring Cyberchef, and intrusion detection through Suricata and Zeek. As you progress, you’ll be introduced to advanced features, including security incident response with TheHive, Synapse, and Cortex Integration, digital forensics using Tracee Forensics software, and malware analysis, along with purple team techniques for social engineering and exploit development. By the end of this book, you should have a comfortable and clear understanding of how this powerful suite of tools can be practically implemented in real-world scenarios.What you will learn Set up and configure a fully functional miniature security operations center (SOC) Gain an understanding of traffic and log analysis using Malcome and Arkime Access Cyberchef from within the environment to address obfuscation Discover incident response methods through TheHive, Synapse, and Cortex Integration Explore digital forensics with the Tracee Forensics software Recognize the potential of purple team techniques for social engineering and exploit development Who this book is forThis book is for cybersecurity professionals who wish to explore a functional defensive environment while retaining access to offensive tools. Those wanting a proper training mechanism for proof-of-concept scenarios will also find this book useful. While not a prerequisite, a solid foundation of offensive versus defensive cybersecurity terms, along with a basic level of experience using any Linux operating system, will help you follow along more easily.
Book InformationISBN 9781835088982
Author Karl LaneFormat Paperback
Page Count 102
Imprint Packt Publishing LimitedPublisher Packt Publishing Limited