Curriculum

  1. 1

    Book Preview

    1. Ultimate Cyberwarfare for Evasive Cyber Tactics Free preview
  2. 2

    Introduction

    1. (Included in full purchase)
  3. 3

    Chapter 1 : History of Cyber Conflicts

    1. (Included in full purchase)
  4. 4

    Chapter 2 : Notable Threats and Trends

    1. (Included in full purchase)
  5. 5

    Chapter 3 : Operational Security Successes and Failures

    1. (Included in full purchase)
  6. 6

    Chapter 4 : The Information Warfare Component

    1. (Included in full purchase)
  7. 7

    Chapter 5 : Programming Languages, Tools, and Frameworks

    1. (Included in full purchase)
  8. 8

    Chapter 6 : Setting Up Your Malware Lab

    1. (Included in full purchase)
  9. 9

    Chapter 7 : Proof-of-Concept Evasive Malware

    1. (Included in full purchase)
  10. 10

    Chapter 8 : Evasive Adversarial Tradecraft

    1. (Included in full purchase)
  11. 11

    Chapter 9 : Emerging Threats and Trends

    1. (Included in full purchase)
  12. 12

    Index

    1. (Included in full purchase)

About the course

The “Ultimate Cyberwarfare for Evasive Cyber Tactic” is an all-encompassing guide, meticulously unfolding across pivotal cybersecurity domains, providing a thorough overview of cyber warfare.The book begins by unraveling the tapestry of today's cyber landscape, exploring current threats, implementation strategies, and notable trends. From operational security triumphs to poignant case studies of failures, readers gain valuable insights through real-world case studies. The book delves into the force-multiplying potential of the Information Warfare component, exploring its role in offensive cyber operations. From deciphering programming languages, tools, and frameworks to practical insights on setting up your own malware lab, this book equips readers with hands-on knowledge. The subsequent chapters will immerse you in the world of proof-of-concept evasive malware and master the art of evasive adversarial tradecraft. Concluding with a forward-looking perspective, the book explores emerging threats and trends, making it an essential read for anyone passionate about understanding and navigating the complex terrain of cyber conflicts.

About the Author

Chang Tan is a Certified MCSI MCD (Mosse Cybersecurity Institute Certified Code Deobfuscation Specialist), specializing in the reverse-engineering and deobfuscation of Advanced Persistent Threat Malware. He has a Bachelor's degree in Accounting from the University of Nevada, Las Vegas, and is currently pursuing a second degree in Finance. Chang has been working with Daniel M. Kelley's Cybersecurity and Growth Organization and scamkillers.org. He is actively involved in activities with DEFCON Group 702 and the C2Society Non-Profit Organization, where on a quarter-annual basis, they hold The Petting Zoo Capture-the-Flag event.