Defensive security
The uniqueness of Kali Purple is how it adds defensive tools to the Kali Linux distribution for blue team operators so that they may train junior analysts and/or otherwise do their jobs. Of course, to fully grasp where these tools might fit into an organization’s security posture, it might be helpful to know some of the terms associated with cyber defense. Here, we will go over some of the more commonly used terms and highlight the cyber defense concepts needed to navigate this book. We will talk more directly about what it means to be a blue teamer and gain an understanding of what the information security/CIA triad, SOC, SOAR, SIEM, IDS/IPS, and other concepts are. In the process, we will focus on how these items relate to Kali Purple.
If you’ve ever studied for a technology certification or any aspect of cybersecurity, you have likely been introduced to the information security triad, also known as the CIA triad. The three components –...