Ethical Hacking Workshop

  • Format
  • Bog, paperback
  • Engelsk
  • 220 sider

Beskrivelse

Get hands-on training and experience in tools, techniques, and best practices for effective ethical hacking to combat cyber threats at any scale



What's inside



Advice on how to use the ethical hacking methodology and thought process to perform a successful ethical hackAn exploration of the various stages of an ethical hack and the tools related to each phaseHands-on exercises at the end of each chapter to ensure you solidify what you've learnt and get experience with the toolsPurchase of the print or Kindle book includes a free PDF eBook

You'll get the most out of this book if



You want to learn more about ethical hackingYou already work as part of a security team, blue team, or purple team or as a security analyst - but that's not a prerequisiteYou want to become familiar with the same skills and tools that potential attackers may use to breach your system and identify security vulnerabilitiesYou have a solid understanding of cloud computing and networking

What your journey will look like



The Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools. By exploring the thought process involved in ethical hacking and the various techniques you can use to obtain results, you'll gain a deep understanding of how to leverage these skills effectively.Throughout the book, you'll learn how to conduct a successful ethical hack, how to use the tools correctly, and how to interpret the results to enhance your environment's security.By the end of this book, you'll be well-versed in ethical hacking and equipped with the skills and knowledge necessary to safeguard your enterprise against cyber-attacks.

Some of the things you'll learn in this book



The key differences between encryption algorithms, hashing algorithms, and cryptography standardsHow to capture and analyze network trafficMastering recon techniques for effective network penetration testingHow to perform scanning techniques and network mappingLeveraging various tools for advanced privilege escalation and lateral movementPersistence mechanisms for maintaining access to compromised systems

Læs hele beskrivelsen
Detaljer
  • SprogEngelsk
  • Sidetal220
  • Udgivelsesdato31-10-2023
  • ISBN139781804612590
  • Forlag Packt Publishing
  • FormatPaperback
Størrelse og vægt
  • Vægt420 g
  • Dybde1,2 cm
  • coffee cup img
    10 cm
    book img
    19,1 cm
    23,5 cm

    Findes i disse kategorier...

    Velkommen til Saxo – din danske boghandel

    Hos os kan du handle som gæst, Saxo-bruger eller Saxo-medlem – du bestemmer selv. Skulle du få brug for hjælp, sidder vores kundeservice-team klar ved både telefonerne og tasterne.

    Om medlemspriser hos Saxo

    For at købe bøger til medlemspris skal du være medlem af Saxo Premium, Saxo Shopping eller Saxo Ung. De første 7 dage er gratis for nye medlemmer. Medlemskabet fornyes automatisk og kan altid opsiges. Læs mere om fordelene ved vores forskellige medlemskaber her.

    Machine Name: SAXO082