Ethical Hacking Workshop: Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity 263204

Код товару: 263204Паперова книга
Get a hands-on training and experience in tools, techniques, and best practices for effective ethical hacking to combat cyber threats at any scale
Key Features
  • Advice on how to use the ethical hacking methodology and thought process to perform a successful ethical hack
  • An exploration of the various stages of an ethical hack and the tools related to each phase
  • You'll get the most out of this book if
  • You want to learn more about ethical hacking
  • You already work as part of a security team, blue team, purple team or as a security analyst — but that’s not a prerequisite
  • You want to become familiar with the same skills and tools that potential attackers may use to breach your system and identify security vulnerabilities
  • You have a solid understanding of cloud computing and networking
  • Hands-on exercises at the end of each chapter to ensure you solidify what you’ve learnt and get experience with the tools
Book Description
The Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools.
By exploring the thought process involved in ethical hacking and the various techniques you can use to obtain results, you'll gain a deep understanding of how to leverage these skills effectively.
Throughout this book, you'll learn how to conduct a successful ethical hack, how to use the tools correctly, and how to interpret the results to enhance your environment's security.
By the end of the book, you'll be well-versed in ethical hacking and equipped with the skills and knowledge necessary to safeguard your enterprise against cyber-attacks.
What you will learn
  • The key differences between encryption algorithms, hashing algorithms and cryptography standards
  • How to capture and analyze network traffic
  • Best practices in performing recon in cloud
  • How to perform scanning techniques and network mapping
  • Leveraging various top tools to perform privilege escalation, lateral movement, and implant backdoors
  • How to clear tracks and evade detection
Who this book is for
The book is intended to be read by those who are looking to learn about ethical hacking. Individuals who are part of security teams, blue teams, purple teams and not limited to security analysts will benefit from this book. The readers should have a good understanding of cloud computing and networking
About the Author
Rishalin Pillay is an Offensive Cybersecurity expert who holds a number of awards and certifications from multiple companies in the Cybersecurity industry. He is well known for his contributions to online learning courses related to Red Teaming and as the author of Learn Penetration Testing. He holds Content Publisher Gold and Platinum awards for his contributions made towards the Cybersecurity Industry, including the Events Speaker Gold award for influential public speaking at Tier-1 business events.
Mohammed Abutheraa is Cybersecurity specialist who has over 15 years of experience in IT security, risk management, security infrastructure, and technology implementation in both private and public sector environments. He worked as Incident Response and Remediation Advisor and supported customers remediating against major incidents in the last years. He has experience in Threat Intelligence and Proactive Services like Vulnerability Assessments and Red / Purple Teaming experiences.
1'500 ₴
Купити
Monobank
до 10 платежей
от 168 ₴ / міс.
  • Нова Пошта
    Безкоштовно від 3'000,00 ₴
  • Укрпошта
    Безкоштовно від 1'000,00 ₴
  • Meest Пошта
    Безкоштовно від 3'000,00 ₴
Ethical Hacking Workshop: Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity - фото 1
Інші книги Packt Publishing

Характеристики

  • Бренд
  • Автор
  • Категорія
    Програмування
  • Рік
    2023
  • Сторінок
    220
  • Формат
    190х230 мм
  • Обкладинка
    М'яка
  • Тип паперу
    Офсетний
  • Мова
    Англійська
  • Ілюстрації
    Чорно-білі

Від видавця

Get a hands-on training and experience in tools, techniques, and best practices for effective ethical hacking to combat cyber threats at any scale
Key Features
  • Advice on how to use the ethical hacking methodology and thought process to perform a successful ethical hack
  • An exploration of the various stages of an ethical hack and the tools related to each phase
  • You'll get the most out of this book if
  • You want to learn more about ethical hacking
  • You already work as part of a security team, blue team, purple team or as a security analyst — but that’s not a prerequisite
  • You want to become familiar with the same skills and tools that potential attackers may use to breach your system and identify security vulnerabilities
  • You have a solid understanding of cloud computing and networking
  • Hands-on exercises at the end of each chapter to ensure you solidify what you’ve learnt and get experience with the tools
Book Description
The Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools.
By exploring the thought process involved in ethical hacking and the various techniques you can use to obtain results, you'll gain a deep understanding of how to leverage these skills effectively.
Throughout this book, you'll learn how to conduct a successful ethical hack, how to use the tools correctly, and how to interpret the results to enhance your environment's security.
By the end of the book, you'll be well-versed in ethical hacking and equipped with the skills and knowledge necessary to safeguard your enterprise against cyber-attacks.
What you will learn
  • The key differences between encryption algorithms, hashing algorithms and cryptography standards
  • How to capture and analyze network traffic
  • Best practices in performing recon in cloud
  • How to perform scanning techniques and network mapping
  • Leveraging various top tools to perform privilege escalation, lateral movement, and implant backdoors
  • How to clear tracks and evade detection
Who this book is for
The book is intended to be read by those who are looking to learn about ethical hacking. Individuals who are part of security teams, blue teams, purple teams and not limited to security analysts will benefit from this book. The readers should have a good understanding of cloud computing and networking
About the Author
Rishalin Pillay is an Offensive Cybersecurity expert who holds a number of awards and certifications from multiple companies in the Cybersecurity industry. He is well known for his contributions to online learning courses related to Red Teaming and as the author of Learn Penetration Testing. He holds Content Publisher Gold and Platinum awards for his contributions made towards the Cybersecurity Industry, including the Events Speaker Gold award for influential public speaking at Tier-1 business events.
Mohammed Abutheraa is Cybersecurity specialist who has over 15 years of experience in IT security, risk management, security infrastructure, and technology implementation in both private and public sector environments. He worked as Incident Response and Remediation Advisor and supported customers remediating against major incidents in the last years. He has experience in Threat Intelligence and Proactive Services like Vulnerability Assessments and Red / Purple Teaming experiences.

Зміст

Table of Contents
  1. Networking Primer
  2. Capturing and Analyzing Network Traffic
  3. A Cryptography Primer
  4. Reconnaissance
  5. Scanning
  6. Gaining Access
  7. Post-Exploitation

Відгуки про Ethical Hacking Workshop: Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity

Ethical Hacking Workshop: Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
Ethical Hacking Workshop: Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
1'500 ₴
Купити
Персонально для вас
Grokking Web Application Security
277862
Malcolm McDonald
980 ₴
Spring Security in Action, Second Edition 2nd Edition
276052
Laurentiu Spilca
1'100 ₴
Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things
303162
Fotios ChantzisIoannis StaisPaulino CalderonEvangelos DeirmentzoglouBeau Woods
1'100 ₴
Cybersecurity Tabletop Exercises: From Planning to Execution
303127
Robert LelewskiJohn Hollenberger
1'200 ₴
Linux Basics for Hackers, 2nd Edition
303136
OccupyTheWeb
1'200 ₴
The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
303258
Jasper van WoudenbergColin O'Flynn
1'200 ₴
Cryptography and Cryptanalysis in Java. 1st Ed.
244673
Stefania Loredana Nita, Marius Iulian Mihailescu
1'500 ₴
Snowflake Security: Securing Your Snowflake Data Cloud. 1st Ed.
244728
Ben Herzberg, Yoav Cohen
1'500 ₴
x86 Software Reverse-Engineering, Cracking, and Counter-Measures
267934
Stephanie DomasChristopher Domas
1'700 ₴
Hands-On Data Visualization. Interactive Storytelling From Spreadsheets to Code
153394
Jack DoughertyIlya Ilyankou
2'000 ₴
Machine Learning Design Patterns. Solutions to Common Challenges in Data Preparation, Model Building, and MLOps. 1st Ed.
244770
Valliappa Lakshmanan
2'200 ₴
Django in Action
282314
Christopher Trudeau
1'400 ₴
Prompt Engineering for LLMs: The Art and Science of Building Large Language Model–Based Applications 1st Edition
292935
John BerrymanAlbert Ziegler
1'800 ₴
Functional Programming with C#: Create More Supportable, Robust, and Testable Code 1st Edition
273875
Simon Painter
1'900 ₴
Blockchain Essentials: Core Concepts and Implementations
266465
Ramchandra Sharad MangrulkarPallavi Vijay Chavan
1'300 ₴
Real World Haskell: Code You Can Believe In 1st Edition
13432
Bryan O'SullivanJohn GoerzenDon Stewart
880 ₴
GPU Pro 6: Advanced Rendering Techniques 1st Edition
122123
Wolfgang Engel
1'800 ₴