Отслеживание заказа
Prom – найбільший маркетплейс України

Kali Linux 2018: Assuring Security by Penetration Testing: Unleash the full potential of Kali Linux 2018, now

Код: pac250405us
В наличии
890 
New
Оплатить частями

Доставка

  • Иконка доставки
    Подписка на доставку Smart
    Бесплатно — в отделения Новой почты
  • Иконка доставки
    Нова Пошта (Бесплатно при условии)

Оплата и гарантии

  • Иконка оплаты
    Безопасная оплата картой
    Изображение для Безопасная оплата картой
    Без переплат
    Prom гарантирует безопасность
    Вернем деньги при отказе от посылки
  • Иконка оплаты
    Оплатить частями
    Изображение для Оплатить частями
    Без переплат*, от 445 ₴/мес.
  • Иконка оплаты
    Наложенный платеж
    Нова Пошта
  • Иконка оплаты
    Оплата на счет
    IBAN UA413808050000000026007762985
Kali Linux 2018: Assuring Security by Penetration Testing: Unleash the full potential of Kali Linux 2018, now - фото 1 - id-p1873892438

Характеристики и описание

ЯзыкАнглийский
ОбложкаМягкая
Папірбіла, офсет
Рік2018
Состояниенова книга
Сторінок528
Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its fourth edition \nKey Features \n
    \n 
  • Rely on the most updated version of Kali to formulate your pentesting strategies
  • \n 
  • Test your corporate network against threats
  • \n 
  • Explore new cutting-edge wireless penetration tools and features
  • \n
\nBook Description \nKali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply the appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in successful penetration testing project engagement. \n \nThis fourth edition of Kali Linux 2018: Assuring Security by Penetration Testing starts with the installation of Kali Linux. You will be able to create a full test environment to safely practice scanning, vulnerability assessment, and exploitation. You'll explore the essentials of penetration testing by collecting relevant data on the target network with the use of several footprinting and discovery tools. As you make your way through the chapters, you'll focus on specific hosts and services via scanning and run vulnerability scans to discover various risks and threats within the target, which can then be exploited. In the concluding chapters, you'll apply techniques to exploit target systems in order to gain access and find a way to maintain that access. You'll also discover techniques and tools for assessing and attacking devices that are not physically connected to the network, including wireless networks. \n \nBy the end of this book, you will be able to use NetHunter, the mobile version of Kali Linux, and write a detailed report based on your findings. \nWhat you will learn \n
    \n 
  • Conduct the initial stages of a penetration test and understand its scope
  • \n 
  • Perform reconnaissance and enumeration of target networks
  • \n 
  • Obtain and crack passwords
  • \n 
  • Use Kali Linux NetHunter to conduct wireless penetration testing
  • \n 
  • Create proper penetration testing reports
  • \n 
  • Understand the PCI-DSS framework and tools used to carry out segmentation scans and penetration testing
  • \n 
  • Carry out wireless auditing assessments and penetration testing
  • \n 
  • Understand how a social engineering attack such as phishing works
  • \n
\nWho this book is for \nThis fourth edition of Kali Linux 2018: Assuring Security by Penetration Testing is for pentesters, ethical hackers, and IT security professionals with basic knowledge of Unix/Linux operating systems. Prior knowledge of information security will help you understand the concepts in this book \nTable of Contents \n
    \n 
  1. Installing and Configuring Kali Linux
  2. \n 
  3. Setting Up Your Test Lab
  4. \n 
  5. Penetration Testing Methodology
  6. \n 
  7. Footprinting and Information Gathering
  8. \n 
  9. Scanning and Evasion Techniques
  10. \n 
  11. Vulnerability Scanning
  12. \n 
  13. Social Engineering
  14. \n 
  15. Target Exploitation
  16. \n 
  17. Privilege-Escalation and Maintaining Access
  18. \n 
  19. Web Application Testing
  20. \n 
  21. Wireless Penetration Testing
  22. \n 
  23. Mobile Penetration Testing with Kali NetHunter
  24. \n 
  25. PCI DSS Scanning and Penetration Testing
  26. \n 
  27. Tools for Penetration Testing Reporting
  28. \n 
  29. Assessments
  30. \n

Також купити книгу Kali Linux 2018: Assuring Security by Penetration Testing: Unleash the full potential of Kali Linux 2018, now with updated tools, 4th Edition, Shiva V. N Parasram Ви можете по посиланню

Был online: Сегодня
Купи-книгу
100% положительных отзывов

Похожее у продавца