Dekorationsartikel gehören nicht zum Leistungsumfang.
Sprache:
Englisch
69,95 €*
Versandkostenfrei per Post / DHL
Lieferzeit 1-2 Wochen
Kategorien:
Beschreibung
Get a hands-on training and experience in tools, techniques, and best practices for effective ethical hacking to combat cyber threats at any scaleKey FeaturesUse the ethical hacking methodology and thought process to perform a successful ethical hack
Explore the various stages of an ethical hack and the tools related to each phase
Purchase of the print or Kindle book includes a free PDF eBook
Book Description
The Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools.
By exploring the thought process involved in ethical hacking and the various techniques you can use to obtain results, you'll gain a deep understanding of how to leverage these skills effectively.
Throughout this book, you'll learn how to conduct a successful ethical hack, how to use the tools correctly, and how to interpret the results to enhance your environment's security. Hands-on exercises at the end of each chapter will ensure that you solidify what you've learnt and get experience with the tools.
By the end of the book, you'll be well-versed in ethical hacking and equipped with the skills and knowledge necessary to safeguard your enterprise against [...] you will learnUnderstand the key differences between encryption algorithms, hashing algorithms, and cryptography standards
Capture and analyze network traffic
Get to grips with the best practices for performing in-cloud recon
Get start with performing scanning techniques and network mapping
Leverage various top tools to perform privilege escalation, lateral movement, and implant backdoors
Find out how to clear tracks and evade detection
Who this book is for
This book is for cybersecurity professionals who already work as part of a security team, blue team, purple team or as a security analyst and want to become familiar with the same skills and tools that potential attackers may use to breach your system and identify security vulnerabilities. A solid understanding of cloud computing and networking is a [...] of ContentsNetworking Primer
Capturing and Analyzing Network Traffic
A Cryptography Primer
Reconnaissance
Scanning
Gaining Access
Post-Exploitation
Explore the various stages of an ethical hack and the tools related to each phase
Purchase of the print or Kindle book includes a free PDF eBook
Book Description
The Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools.
By exploring the thought process involved in ethical hacking and the various techniques you can use to obtain results, you'll gain a deep understanding of how to leverage these skills effectively.
Throughout this book, you'll learn how to conduct a successful ethical hack, how to use the tools correctly, and how to interpret the results to enhance your environment's security. Hands-on exercises at the end of each chapter will ensure that you solidify what you've learnt and get experience with the tools.
By the end of the book, you'll be well-versed in ethical hacking and equipped with the skills and knowledge necessary to safeguard your enterprise against [...] you will learnUnderstand the key differences between encryption algorithms, hashing algorithms, and cryptography standards
Capture and analyze network traffic
Get to grips with the best practices for performing in-cloud recon
Get start with performing scanning techniques and network mapping
Leverage various top tools to perform privilege escalation, lateral movement, and implant backdoors
Find out how to clear tracks and evade detection
Who this book is for
This book is for cybersecurity professionals who already work as part of a security team, blue team, purple team or as a security analyst and want to become familiar with the same skills and tools that potential attackers may use to breach your system and identify security vulnerabilities. A solid understanding of cloud computing and networking is a [...] of ContentsNetworking Primer
Capturing and Analyzing Network Traffic
A Cryptography Primer
Reconnaissance
Scanning
Gaining Access
Post-Exploitation
Get a hands-on training and experience in tools, techniques, and best practices for effective ethical hacking to combat cyber threats at any scaleKey FeaturesUse the ethical hacking methodology and thought process to perform a successful ethical hack
Explore the various stages of an ethical hack and the tools related to each phase
Purchase of the print or Kindle book includes a free PDF eBook
Book Description
The Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools.
By exploring the thought process involved in ethical hacking and the various techniques you can use to obtain results, you'll gain a deep understanding of how to leverage these skills effectively.
Throughout this book, you'll learn how to conduct a successful ethical hack, how to use the tools correctly, and how to interpret the results to enhance your environment's security. Hands-on exercises at the end of each chapter will ensure that you solidify what you've learnt and get experience with the tools.
By the end of the book, you'll be well-versed in ethical hacking and equipped with the skills and knowledge necessary to safeguard your enterprise against [...] you will learnUnderstand the key differences between encryption algorithms, hashing algorithms, and cryptography standards
Capture and analyze network traffic
Get to grips with the best practices for performing in-cloud recon
Get start with performing scanning techniques and network mapping
Leverage various top tools to perform privilege escalation, lateral movement, and implant backdoors
Find out how to clear tracks and evade detection
Who this book is for
This book is for cybersecurity professionals who already work as part of a security team, blue team, purple team or as a security analyst and want to become familiar with the same skills and tools that potential attackers may use to breach your system and identify security vulnerabilities. A solid understanding of cloud computing and networking is a [...] of ContentsNetworking Primer
Capturing and Analyzing Network Traffic
A Cryptography Primer
Reconnaissance
Scanning
Gaining Access
Post-Exploitation
Explore the various stages of an ethical hack and the tools related to each phase
Purchase of the print or Kindle book includes a free PDF eBook
Book Description
The Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools.
By exploring the thought process involved in ethical hacking and the various techniques you can use to obtain results, you'll gain a deep understanding of how to leverage these skills effectively.
Throughout this book, you'll learn how to conduct a successful ethical hack, how to use the tools correctly, and how to interpret the results to enhance your environment's security. Hands-on exercises at the end of each chapter will ensure that you solidify what you've learnt and get experience with the tools.
By the end of the book, you'll be well-versed in ethical hacking and equipped with the skills and knowledge necessary to safeguard your enterprise against [...] you will learnUnderstand the key differences between encryption algorithms, hashing algorithms, and cryptography standards
Capture and analyze network traffic
Get to grips with the best practices for performing in-cloud recon
Get start with performing scanning techniques and network mapping
Leverage various top tools to perform privilege escalation, lateral movement, and implant backdoors
Find out how to clear tracks and evade detection
Who this book is for
This book is for cybersecurity professionals who already work as part of a security team, blue team, purple team or as a security analyst and want to become familiar with the same skills and tools that potential attackers may use to breach your system and identify security vulnerabilities. A solid understanding of cloud computing and networking is a [...] of ContentsNetworking Primer
Capturing and Analyzing Network Traffic
A Cryptography Primer
Reconnaissance
Scanning
Gaining Access
Post-Exploitation
Über den Autor
Rishalin Pillay is an Offensive Cybersecurity expert who holds a number of awards and certifications from multiple companies in the Cybersecurity industry. He is well known for his contributions to online learning courses related to Red Teaming and as the author of Learn Penetration Testing. He holds Content Publisher Gold and Platinum awards for his contributions made towards the Cybersecurity Industry, including the Events Speaker Gold award for influential public speaking at Tier-1 business events.
Details
Erscheinungsjahr: | 2023 |
---|---|
Fachbereich: | Datenkommunikation, Netze & Mailboxen |
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
ISBN-13: | 9781804612590 |
ISBN-10: | 1804612596 |
Sprache: | Englisch |
Ausstattung / Beilage: | Paperback |
Einband: | Kartoniert / Broschiert |
Autor: |
Pillay, Rishalin
Abutheraa, Mohammed |
Hersteller: | Packt Publishing |
Verantwortliche Person für die EU: | Books on Demand GmbH, In de Tarpen 42, D-22848 Norderstedt, info@bod.de |
Maße: | 235 x 191 x 12 mm |
Von/Mit: | Rishalin Pillay (u. a.) |
Erscheinungsdatum: | 31.10.2023 |
Gewicht: | 0,42 kg |
Über den Autor
Rishalin Pillay is an Offensive Cybersecurity expert who holds a number of awards and certifications from multiple companies in the Cybersecurity industry. He is well known for his contributions to online learning courses related to Red Teaming and as the author of Learn Penetration Testing. He holds Content Publisher Gold and Platinum awards for his contributions made towards the Cybersecurity Industry, including the Events Speaker Gold award for influential public speaking at Tier-1 business events.
Details
Erscheinungsjahr: | 2023 |
---|---|
Fachbereich: | Datenkommunikation, Netze & Mailboxen |
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
ISBN-13: | 9781804612590 |
ISBN-10: | 1804612596 |
Sprache: | Englisch |
Ausstattung / Beilage: | Paperback |
Einband: | Kartoniert / Broschiert |
Autor: |
Pillay, Rishalin
Abutheraa, Mohammed |
Hersteller: | Packt Publishing |
Verantwortliche Person für die EU: | Books on Demand GmbH, In de Tarpen 42, D-22848 Norderstedt, info@bod.de |
Maße: | 235 x 191 x 12 mm |
Von/Mit: | Rishalin Pillay (u. a.) |
Erscheinungsdatum: | 31.10.2023 |
Gewicht: | 0,42 kg |
Sicherheitshinweis