Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    ISBN: 9781837632473 , 1837632472
    Language: English
    Pages: 1 online resource (1 audio file (13 hr., 47 min.))
    Edition: Second edition.
    DDC: 005.8
    Keywords: Kali Linux ; Penetration testing (Computer security) ; Hackers ; Operating systems (Computers) ; Audiobooks
    Abstract: Explore the latest ethical hacking tools and techniques to perform penetration testing from scratch About This Audiobook Learn to compromise enterprise networks with Kali Linux Gain comprehensive insights into security concepts using advanced real-life hacker techniques Use Kali Linux in the same way ethical hackers and penetration testers do to gain control of your environment In Detail Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks. This audiobook is a comprehensive guide for those who are new to Kali Linux and penetration testing that will have you up to speed in no time. Using real-world scenarios, you'll understand how to set up a lab and explore core penetration testing concepts. Throughout this book, you'll focus on information gathering and even discover different vulnerability assessment tools bundled in Kali Linux. You'll learn to discover target systems on a network, identify security flaws on devices, exploit security weaknesses and gain access to networks, set up Command and Control (C2) operations, and perform web application penetration testing. In this updated second edition, you'll be able to compromise Active Directory and exploit enterprise networks. Finally, this audiobook covers best practices for performing complex web penetration testing techniques in a highly secured environment. By the end of this Kali Linux audiobook, you'll have gained the skills to perform advanced penetration testing on enterprise networks using Kali Linux. Audience This pentesting audiobook is for students, trainers, cybersecurity professionals, cyber enthusiasts, network security professionals, ethical hackers, penetration testers, and security engineers. If you do not have any prior knowledge and are looking to become an expert in penetration testing using the Kali Linux operating system (OS), then this book is for you.
    Note: Online resource; title from title details screen (O'Reilly, viewed December 13, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9781837636600 , 1837636605
    Language: English
    Pages: 1 online resource (430 p.)
    Edition: 1st edition.
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Hacking
    Abstract: Use real-world reconnaissance techniques to efficiently gather sensitive information on systems and networks Purchase of the print or Kindle book includes a free PDF eBook Key Features Learn how adversaries use reconnaissance techniques to discover security vulnerabilities on systems Develop advanced open source intelligence capabilities to find sensitive information Explore automated reconnaissance and vulnerability assessment tools to profile systems and networks Book Description This book explores reconnaissance techniques - the first step in discovering security vulnerabilities and exposed network infrastructure. It aids ethical hackers in understanding adversaries' methods of identifying and mapping attack surfaces, such as network entry points, which enables them to exploit the target and steal confidential information. Reconnaissance for Ethical Hackers helps you get a comprehensive understanding of how threat actors are able to successfully leverage the information collected during the reconnaissance phase to scan and enumerate the network, collect information, and pose various security threats. This book helps you stay one step ahead in knowing how adversaries use tactics, techniques, and procedures (TTPs) to successfully gain information about their targets, while you develop a solid foundation on information gathering strategies as a cybersecurity professional. The concluding chapters will assist you in developing the skills and techniques used by real adversaries to identify vulnerable points of entry into an organization and mitigate reconnaissance-based attacks. By the end of this book, you'll have gained a solid understanding of reconnaissance, as well as learned how to secure yourself and your organization without causing significant disruption. What you will learn Understand the tactics, techniques, and procedures of reconnaissance Grasp the importance of attack surface management for organizations Find out how to conceal your identity online as an ethical hacker Explore advanced open source intelligence (OSINT) techniques Perform active reconnaissance to discover live hosts and exposed ports Use automated tools to perform vulnerability assessments on systems Discover how to efficiently perform reconnaissance on web applications Implement open source threat detection and monitoring tools Who this book is for If you are an ethical hacker, a penetration tester, red teamer, or any cybersecurity professional looking to understand the impact of reconnaissance-based attacks, how they take place, and what organizations can do to protect against them, then this book is for you. Cybersecurity professionals will find this book useful in determining the attack surface of their organizations and assets on their network, while understanding the behavior of adversaries.
    Note: Description based upon print version of record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9781788996686 , 1788996682
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Kali Linux ; Penetration testing (Computer security) ; Application software ; Testing ; Computer networks ; Security measures ; Electronic books ; Electronic books ; local
    Abstract: Convert Android to a powerful pentesting platform. Key Features Get up and running with Kali Linux NetHunter Connect your Android device and gain full control over Windows, OSX, or Linux devices Crack Wi-Fi passwords and gain access to devices connected over the same network collecting intellectual data Book Description Kali NetHunter is a version of the popular and powerful Kali Linux pentesting platform, designed to be installed on mobile devices. Hands-On Penetration Testing with Kali NetHunter will teach you the components of NetHunter and how to install the software. You'll also learn about the different tools included and how to optimize and use a package, obtain desired results, perform tests, and make your environment more secure. Starting with an introduction to Kali NetHunter, you will delve into different phases of the pentesting process. This book will show you how to build your penetration testing environment and set up your lab. You will gain insight into gathering intellectual data, exploiting vulnerable areas, and gaining control over target systems. As you progress through the book, you will explore the NetHunter tools available for exploiting wired and wireless devices. You will work through new ways to deploy existing tools designed to reduce the chances of detection. In the concluding chapters, you will discover tips and best practices for integrating security hardening into your Android ecosystem. By the end of this book, you will have learned to successfully use a mobile penetration testing device based on Kali NetHunter and Android to accomplish the same tasks you would traditionally, but in a smaller and more mobile form factor. What you will learn Choose and configure a hardware device to use Kali NetHunter Use various tools during pentests Understand NetHunter suite components Discover tips to effectively use a compact mobile platform Create your own Kali NetHunter-enabled device and configure it for optimal results Learn to scan and gather information from a target Explore hardware adapters for testing and auditing wireless networks and Bluetooth devices Who this book is for Hands-On Penetration Testing with Kali NetHunter is for pentesters, ethical hackers, and security professionals who want to learn to use Kali NetHunter for complete mobile penetration testing and are interested in venturing into the mobile domain. Some prior understanding of networking assessment and Kali Linux will be helpful.
    Note: Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed April 18, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9781801819015 , 1801819017 , 9781801818933
    Language: English
    Pages: 1 online resource , illustrations
    Edition: Second edition.
    DDC: 005.8
    Keywords: Kali Linux ; Penetration testing (Computer security) ; Hackers ; Operating systems (Computers) ; Kali Linux ; Tests d'intrusion ; Pirates informatiques ; Systèmes d'exploitation (Ordinateurs) ; operating systems ; COMPUTERS ; Operating Systems ; Linux ; COMPUTERS ; Networking ; Network Protocols ; COMPUTERS ; Security ; Networking ; Hackers ; Operating systems (Computers) ; Penetration testing (Computer security) ; Electronic books ; Electronic books
    Abstract: Explore the latest ethical hacking tools and techniques to perform penetration testing from scratch Key Features Learn to compromise enterprise networks with Kali Linux Gain comprehensive insights into security concepts using advanced real-life hacker techniques Use Kali Linux in the same way ethical hackers and penetration testers do to gain control of your environment Book Description Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks. This book is a comprehensive guide for those who are new to Kali Linux and penetration testing that will have you up to speed in no time. Using real-world scenarios, you'll understand how to set up a lab and explore core penetration testing concepts. Throughout this book, you'll focus on information gathering and even discover different vulnerability assessment tools bundled in Kali Linux. You'll learn to discover target systems on a network, identify security flaws on devices, exploit security weaknesses and gain access to networks, set up Command and Control (C2) operations, and perform web application penetration testing. In this updated second edition, you'll be able to compromise Active Directory and exploit enterprise networks. Finally, this book covers best practices for performing complex web penetration testing techniques in a highly secured environment. By the end of this Kali Linux book, you'll have gained the skills to perform advanced penetration testing on enterprise networks using Kali Linux. What you will learn Explore the fundamentals of ethical hacking Understand how to install and configure Kali Linux Perform asset and network discovery techniques Focus on how to perform vulnerability assessments Exploit the trust in Active Directory domain services Perform advanced exploitation with Command and Control (C2) techniques Implement advanced wireless hacking techniques Become well-versed with exploiting vulnerable web applications Who this book is for This pentesting book is for students, trainers, cybersecurity professionals, cyber enthusiasts, network security professionals, ethical hackers, penetration testers, and security engineers. If you do not have any prior knowledge and are looking to become an expert in penetration testing using the Kali Linux operating system (OS), then this book is for you.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9781803236896 , 1803236892 , 9781803236063
    Language: English
    Pages: 1 online resource (692 pages) , illustrations
    Edition: Second edition.
    DDC: 004.6
    Keywords: Computer networks Study guides Examinations ; Telecommunications engineers Certification ; Electronic data processing personnel Certification ; Computer networks ; Examinations ; Electronic data processing personnel ; Certification ; Telecommunications engineers ; Certification ; Study guides ; Electronic books
    Abstract: This book helps you to easily understand core networking concepts without the need of prior industry experience or knowledge within this fi eld of study. This updated second edition of the CompTIA Network+ N10-008 Certification Guide begins by introducing you to the core fundamentals of networking technologies and concepts, before progressing to intermediate and advanced topics using a student-centric approach. You'll explore best practices for designing and implementing a resilient and scalable network infrastructure to support modern applications and services. Additionally, you'll learn network security concepts and technologies to effectively secure organizations from cyber attacks and threats. The book also shows you how to efficiently discover and resolve networking issues using common troubleshooting techniques. By the end of this book, you'll have gained sufficient knowledge to efficiently design, implement, and maintain a network infrastructure as a successful network professional within the industry. You'll also have gained knowledge of all the official CompTIA Network+ N10-008 exam objectives, networking technologies, and how to apply your skills in the real world.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...