Отслеживание заказа
Prom – найбільший маркетплейс України

Ethical Hacking Workshop: Explore a practical approach to learning and applying ethical hacking techniques for effective

Код: 263204
В наличии
570 

Доставка

  • Иконка доставки
    Нова Пошта (Бесплатно при условии)

Оплата и гарантии

  • Иконка оплаты
    Безопасная оплата картой
    Изображение для Безопасная оплата картой
    Без переплат
    Prom гарантирует безопасность
    Вернем деньги при отказе от посылки
  • Иконка оплаты
    Наложенный платеж
    Нова Пошта, Самовывоз
Ethical Hacking Workshop: Explore a practical approach to learning and applying ethical hacking techniques for effective - фото 1 - id-p2894571399

Характеристики и описание

ISBN978-1804612590
АвторRishalin Pillay, Mohammed Abutheraa
Год2023
ИздательствоPackt Publishing
Страниц220
ЯзыкАнглийский
Get a hands-on training and experience in tools, techniques, and best practices for effective ethical hacking to combat cyber threats at any scaleKey FeaturesAdvice on how to use the ethical hacking methodology and thought process to perform a successful ethical hackAn exploration of the various stages of an ethical hack and the tools related to each phaseYou'll get the most out of this book ifYou want to learn more about ethical hackingYou already work as part of a security team, blue team, purple team or as a security analyst — but that’s not a prerequisiteYou want to become familiar with the same skills and tools that potential attackers may use to breach your system and identify security vulnerabilitiesYou have a solid understanding of cloud computing and networkingHands-on exercises at the end of each chapter to ensure you solidify what you’ve learnt and get experience with the toolsBook DescriptionThe Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools.By exploring the thought process involved in ethical hacking and the various techniques you can use to obtain results, you'll gain a deep understanding of how to leverage these skills effectively.Throughout this book, you'll learn how to conduct a successful ethical hack, how to use the tools correctly, and how to interpret the results to enhance your environment's security.By the end of the book, you'll be well-versed in ethical hacking and equipped with the skills and knowledge necessary to safeguard your enterprise against cyber-attacks.What you will learnThe key differences between encryption algorithms, hashing algorithms and cryptography standardsHow to capture and analyze network trafficBest practices in performing recon in cloudHow to perform scanning techniques and network mappingLeveraging various top tools to perform privilege escalation, lateral movement, and implant backdoorsHow to clear tracks and evade detectionWho this book is forThe book is intended to be read by those who are looking to learn about ethical hacking. Individuals who are part of security teams, blue teams, purple teams and not limited to security analysts will benefit from this book. The readers should have a good understanding of cloud computing and networkingAbout the AuthorRishalin Pillay is an Offensive Cybersecurity expert who holds a number of awards and certifications from multiple companies in the Cybersecurity industry. He is well known for his contributions to online learning courses related to Red Teaming and as the author of Learn Penetration Testing. He holds Content Publisher Gold and Platinum awards for his contributions made towards the Cybersecurity Industry, including the Events Speaker Gold award for influential public speaking at Tier-1 business events.Mohammed Abutheraa is Cybersecurity specialist who has over 15 years of experience in IT security, risk management, security infrastructure, and technology implementation in both private and public sector environments. He worked as Incident Response and Remediation Advisor and supported customers remediating against major incidents in the last years. He has experience in Threat Intelligence and Proactive Services like Vulnerability Assessments and Red / Purple Teaming experiences. Table of ContentsNetworking PrimerCapturing and Analyzing Network TrafficA Cryptography PrimerReconnaissanceScanningGaining AccessPost-Exploitation

Отзывы о товаре

0
Еще не было отзывов о товаре у этого продавца
Был online: Сегодня
ПАЛІТУРКА
98% положительных отзывов

Похожее у продавца