Practical Foundations in Cybersecurity
  • 🖌️Practical Foundations in Cybersecurity
  • 1. IT career planning
    • Introduction - IT career planning
    • IT career paths – everything you need to know
    • Job roles in IT and cybersecurity
    • How to break into information security
    • The Security Operations Center (SOC) career path
    • The GRC analyst role
    • How to get CCNA certification
    • Job search strategy
  • 2. Introduction to cybersecurity
    • Introduction - Introduction to cybersecurity
    • Foundational cybersecurity concepts and practices
      • Information security definition
      • Confidentiality, integrity, and availability of information
      • Risk, threat, vulnerability
    • The cybersecurity threat landscape
    • Common cyber attacks
    • Risk mitigation methods
    • Network security risk mitigation best practices
  • 3. Cybersecurity GRC
    • Introduction - Cybersecurity GRC
    • Cybersecurity GRC
  • 4. Networking fundamentals
    • Introduction - Networking fundamentals
    • How data flow through the Internet
    • Network devices and their functions
    • The Open Systems Interconnection (OSI) model
    • Host to host communication in networking
    • How switches facilitate communication
    • How routers facilitate communication
    • Network protocols and their functions
    • OSI model layers and security threats
  • 5. Wireless security and cryptography
    • Introduction - Wireless security and cryptography
    • SSL/TLS cryptography
    • Wireless network security
    • Hashing algorithms and message integrity
    • Cryptographic encryption and confidentiality
    • The SSL/TLS handshake
    • Message signing using asymmetric keys
    • Authentication methods
    • Replay attacks and anti-replay methods
    • Generating and applying an RSA key
    • IEEE 802.11 authentication methods
    • IEEE 802.11 privacy and integrity methods
    • Authentication and encryption in WPA, WPA2, and WPA3
  • 6. Practical foundations in ethical hacking
    • Introduction - Practical foundations in ethical hacking
    • What is professional ethical hacking
    • The perils of unethical hacking
    • Defensive security vs offensive security
    • Defensive cybersecurity technologies
    • Phases of the penetration testing process
    • Types of penetration testing
    • Pentesting methodologies, frameworks, and technologies
    • Common attack targets
  • 7. Conclusion
    • Introduction - Conclusion
    • Final words
Powered by GitBook
On this page
  1. 6. Practical foundations in ethical hacking

Defensive security vs offensive security

This section explains two important concepts within the cybersecurity field, defensive security and offensive security, and their importance for an effective organizational security policy

• Become familiar with defensive security and offensive security approaches, including SIRT/CSIRT (Security Incident Response Team/Computer Security Incident Response Team), SOC (Security Operations Center), red teaming, and ethical hacking.

How red teaming and ethical hacking differ and overlap:

Similarities:

  • Both involve authorized attempts to identify vulnerabilities in systems, networks, or organizations.

  • Both aim to improve security by exposing weaknesses before malicious actors exploit them.

  • Both require technical skills in penetration testing, social engineering, and attack simulations.

Key Differences:

Aspect

Ethical Hacking

Red Teaming

Scope

Often focuses on specific systems or apps.

Broader, simulating real-world adversaries (including physical & social attacks).

Objective

Find and fix vulnerabilities.

Test detection & response capabilities (not just tech flaws).

Duration

Short-term, targeted engagements.

Longer, multi-phase operations (like espionage).

Stealth

May or may not avoid detection.

Often prioritizes stealth to mimic real attackers.

Team Structure

Usually individual testers or small groups.

Larger, multidisciplinary teams (cyber, physical, social).

Reporting

Detailed technical remediation guidance.

Focuses on strategic security gaps & organizational resilience.

When They Overlap:

  • A red team can use ethical hacking techniques (e.g., exploiting a server vulnerability).

  • Some ethical hackers perform red teaming if the engagement includes advanced adversary simulation.

Analogy:

  • Ethical Hacking = A home inspector checking for structural flaws.

  • Red Teaming = A burglary drill testing alarms, guards, and response times.

Bottom Line:

Red teaming is a subset of ethical hacking with a broader, adversarial focus. Ethical hacking is more general, while red teaming mimics sophisticated threat actors. Many professionals do both, but not all ethical hackers are red teamers.

PreviousThe perils of unethical hackingNextDefensive cybersecurity technologies

Last updated 1 day ago