Who this book is for
In the cybersecurity industry, you will come across different security teams. These groups entail red teams (those who simulate an attacker’s behavior and have a predefined goal, also known as ethical hackers) and blue teams (these are generally comprised of SOC analysts and those tasked with detecting the bad guys, or red team). This book is written for those who are keen on learning about ethical hacking. In this book, you will learn how to think like an ethical hacker and employ the tools commonly used by ethical hackers in the real world.