مكتبة جرير

Ethical Hacking Workshop: Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity

كتاب مطبوع
وحدة البيع: EACH
59 ر.س. شهرياً /4 أشهر
المؤلف: Pillay, Rishalin
تاريخ النشر: 2023
تصنيف الكتاب: التقنية والكمبيوتر الكتب الانجليزية,
عدد الصفحات: 220 Pages
الصيغة: غلاف ورقي
هذا الكتاب يُطبع عند الطلب وغير قابل للاسترجاع بعد الشراء
    أو

    عن المنتج

    Get a hands-on training and experience in tools, techniques, and best practices for effective ethical hacking to combat cyber threats at any scale

    Key Features
    • Use the ethical hacking methodology and thought process to perform a successful ethical hack
    • Explore the various stages of an ethical hack and the tools related to each phase
    • Purchase of the print or Kindle book includes a free PDF eBook
    Book Description

    The Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools.

    By exploring the thought process involved in ethical hacking and the various techniques you can use to obtain results, youll gain a deep understanding of how to leverage these skills effectively.

    Throughout this book, youll learn how to conduct a successful ethical hack, how to use the tools correctly, and how to interpret the results to enhance your environments security. Hands-on exercises at the end of each chapter will ensure that you solidify what youve learnt and get experience with the tools.

    By the end of the book, youll be well-versed in ethical hacking and equipped with the skills and knowledge necessary to safeguard your enterprise against cyber-attacks.

    What you will learn
    • Understand the key differences between encryption algorithms, hashing algorithms, and cryptography standards
    • Capture and analyze network traffic
    • Get to grips with the best practices for performing in-cloud recon
    • Get start with performing scanning techniques and network mapping
    • Leverage various top tools to perform privilege escalation, lateral movement, and implant backdoors
    • Find out how to clear tracks and evade detection
    Who this book is for

    This book is for cybersecurity professionals who already work as part of a security team, blue team, purple team or as a security analyst and want to become familiar with the same skills and tools that potential attackers may use to breach your system and identify security vulnerabilities. A solid understanding of cloud computing and networking is a prerequisite.

    Table of Contents
    1. Networking Primer
    2. Capturing and Analyzing Network Traffic
    3. A Cryptography Primer
    4. Reconnaissance
    5. Scanning
    6. Gaining Access
    7. Post-Exploitation
    عرض أكثر

    مراجعات العملاء