Jump to ratings and reviews
Rate this book

Cybersecurity Blue Team Toolkit

Rate this book
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data breaches fill the headlines, it has become impossible for any business, large or small, to ignore the importance of cybersecurity. Most books on the subject, however, are either too specialized for the non-technical professional or too general for positions in the IT trenches. Thanks to author Nadean Tanner’s wide array of experience from teaching at a University to working for the Department of Defense, the Cybersecurity Blue Team Toolkit strikes the perfect balance of substantive and accessible, making it equally useful to those in IT or management positions across a variety of industries. This handy guide takes a simple and strategic look at best practices and tools available to both cybersecurity management and hands-on professionals, whether they be new to the field or looking to expand their expertise. Tanner gives comprehensive coverage to such crucial topics as security assessment and configuration, strategies for protection and defense, offensive measures, and remediation while aligning the concept with the right tool using the CIS Controls version 7 as a guide. Readers will learn why and how to use fundamental open source and free tools such as ping, tracert, PuTTY, pathping, sysinternals, NMAP, OpenVAS, Nexpose Community, OSSEC, Hamachi, InSSIDer, Nexpose Community, Wireshark, Solarwinds Kiwi Syslog Server, Metasploit, Burp, Clonezilla and many more. Up-to-date and practical cybersecurity instruction, applicable to both management and technical positions The Cybersecurity Blue Team Toolkit is an excellent resource for anyone working in digital policy as well as IT security professionals, technical analysts, program managers, and Chief Information and Technology Officers. This is one handbook that won’t gather dust on the shelf, but remain a valuable reference at any career level, from student to executive.

288 pages, Paperback

Published April 30, 2019

Loading...
Loading...

About the author

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
12 (27%)
4 stars
13 (30%)
3 stars
10 (23%)
2 stars
7 (16%)
1 star
1 (2%)
Displaying 1 - 7 of 7 reviews
2 reviews
October 12, 2019
I'm baffled by the good reviews. This book is pure garbage. The writing is poor, on the level of a middle schooler, the content is outdated, and I'd never in a million years give this book to one of my cyber security students. I'm required to give my students the most up to date knowledge in the industry, written by the world's best cyber experts, Nadean Tanner is neither up to date or knowledgeable. Skip this one!!! It's genuinely AWFUL.
Profile Image for Nick.
43 reviews
November 30, 2025
This book is geared more towards those totally unfamiliar with cybersecurity, but a solid read for those already in the security field. I can see this book being extremely helpful for folks in startups/small businesses, as a lot of the tools listed in this book are good for those types of environments. For medium to large businesses, these tools would all likely be substituted with more proprietary software, as is necessary. This book provides a comprehensive overview of everything a blue-teamer should know: from vulnerability management, logging, access controls, to pen testing and kali linux. Even if these free tools won't be used in your environment, it's good to know what the bigger tools do at a granular level, and this book provides that information.

I think no matter the level of sophistication you have, everyone would learn a few things from Nadean. She explains these tools with great precision and clarity, providing the reader with the step-by-step process on installing and using each of the tools mentioned throughout.
Profile Image for Kārlis Bergmanis.
99 reviews5 followers
September 20, 2022
Too many tools in too quick succession.
First chapter includes ping - well, if you need to learn about ping, perhaps you should take step back and start with IT basics before specializing in security. One of last ones is already at Metasploit - bit of a jump, isn't it.
Of course, if you just want reference book for various tools, then this might be Ok for you.
3 reviews
January 20, 2022
Good efforts - but mostly a generic, beginner boot on a few blue teaming tools. It was good a reviewing some tools but I can't say that I learned anything new.
2 reviews
May 30, 2023
A great book on how to be more prepared in securing your network.
Profile Image for Elle.
15 reviews4 followers
May 13, 2022
Yeah first couple of chapters were nice. Nothing new but a nice refresher. Midway through the book, its outdate-ness starts showing. Tanner lists basic tools, we all know. Doesn't expand, no new features. It becomes a list of open source software and how to download it. Not worth the time. Watch Youtube tutorials
Displaying 1 - 7 of 7 reviews