Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity 261468

Паперова книга
261468
Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity - фото 1
2'700
8 людей
Купити

Все про “Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity”

Від видавця

Uncover security vulnerabilities and harden your system against attacks! With this guide you’ll learn to set up a virtual learning environment where you can test out hacking tools, from Kali Linux to hydra and Wireshark. Then with step-by-step instructions you’ll expand your understanding of offline hacking, external safety checks, penetration testing in networks, and other essential security techniques, including steps for mobile, cloud, and IoT security. Use this guide to ensure your system can withstand any threat!
  • Understand IT system vulnerabilities and identify attack vectors
  • Learn to secure multiple infrastructures, including Linux, Microsoft Windows, cloud, and mobile
  • Master pen testing with tools like Metaspolit, Kali Linux, hydra, Open-VAS, Empire, Pwnagotchi, and more
Key Concepts and Tools
Set up your environment with Metasploitable and Juice Shop, install Kali Linux, and explore hacking tools like nmap, hydra, and Armitage that will assist you with the more complex practices covered in later chapters.
Penetration Testing and Security Practices
From man-in-the-middle attacks to finding vulnerabilities using nmap, walk step-by-step through client-side and network penetration testing. Master key security techniques like passwords, IT forensics, and safety checks and see how to secure Windows servers, Linux, Samba file servers, and web applications.
Advanced Security Concepts
Supplement your understanding of security concepts with practical instruction and theoretical information on more advanced topics like cloud, mobile, and Internet of Things security. Learn how to secure Office 365 through multi-level authentication and conditional access, explore protective measures for Android and iOS, and determine IoT protocols and services.
About the Author
Michael Kofler is a renowned author of German IT publications. He works as an administrator and software developer, and is also a lecturer at a technical college. Michael is the driving force behind Hacking & Security, having written a number of its chapters, recruited its author team, designed the book, and supervised its writing as editor.
Klaus Gebeshuber is the professor of IT security at FH JOANNEUM, University of Applied Sciences in Kapfenberg, Austria. His focus is on network security, industrial security, security analysis, and penetration testing. He holds numerous industry certificates in the field of IT security, network security, and penetration testing.
Peter Kloep is an expert of secure Microsoft Windows infrastructures in German-speaking countries. He has been a Microsoft Certified Trainer since 2002 and has held numerous technical training courses on Windows administration since then. He is also a Microsoft Certified Software Engineer and Microsoft Certified Solutions Master - Windows Server 2012.
Frank Neugebauer worked in IT security for more than 25 years as an officer in the German Armed Forces. He was also employed as an IT security officer for various departments in Germany and abroad, a systems engineer at a NATO headquarters, and head of an incident response team. As a member of the German Armed Forces' Computer Emergency Response Team, he played a key role in analyzing vulnerabilities in many German Armed Forces networks.
Andre Zingsheim works as a senior security consultant at TUV TRUST IT GmbH. In addition to technical security analyzes and penetration tests of IT systems and infrastructures, he deals intensively with the security of mobile devices. He is a penetration tester certified by the Bundesamt fur Sicherheit in der Informationstechnik (BSI) (Federal Office for Information Security).
Thomas Hackner is senior security consultant and managing director of HACKNER Security Intelligence GmbH, which he founded in 2010 after studying secure information systems in Hagenberg, Upper Austria. He also works on international projects in which both IT networks and web applications as well as SCADA systems are checked for security in the form of penetration tests.
Markus Widl has been working as a consultant, developer, and trainer in IT for more than 20 years. His focus is on cloud technologies such as MS Office 365 and Microsoft Azure.
Roland Aigner is an expert in secure IoT infrastructures. He developed firmware and software for medical in-vitro diagnostics, is a co-author of the Bluetooth SIG, and a founding member of the NFC Forum, where he was specifically responsible for ticketing and communication security.
Stefan Kania has been a freelance consultant and trainer since 1997. His focus is on the secure implementation of Samba and LDAP as well as training on both topics.
Tobias Scheible is a research associate at Albstadt-Sigmaringen University. There he works as a lecturer in the university certificate program at the Institut fur wissenschaftliche Weiterbildung (IWW) (Institute for Scientific Continuing Education) and holds extra-occupational modules in the areas of network security, Internet technologies, and IT forensics. In addition, he holds lectures and workshops for associations and companies, including open events for the VDI.
Matthias Wubbeling is an IT security enthusiast, scientist, author, entrepreneur, consultant, and speaker. As an academic advisor at the University of Bonn and a scientist at Fraunhofer FKIE, he researches and teaches in the areas of network security, IT security awareness, and identity theft.

Рецензії

0

Всі характеристики

Товар входить до категорії

  • Самовивіз з відділень поштових операторів від 45 ₴ - 80 ₴
  • Безкоштовна доставка від 3000 грн
Схожі товари
Security Chaos Engineering: Sustaining Resilience in Software and Systems 1st Edition
274007
Kelly ShortridgeAaron Rinehart
1'700 ₴
Zero Trust Networks: Building Secure Systems in Untrusted Network 2nd Edition
275838
Razi RaisChristina MorilloDoug BarthEvan Gilman
1'700 ₴
The Definitive Guide to Security in Jakarta EE. Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More. 1st Ed.
244733
Arjan Tijms, Teo Bais, Werner Keil
1'800 ₴
The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet (Tech Today) 1st Edition
280687
David Senecal
1'800 ₴
Cryptography and Cryptanalysis in MATLAB. 1st Ed.
244674
Marius Iulian Mihailescu, Stefania Loredana Nita
1'900 ₴
Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing
280690
James Forshaw
1'900 ₴
Kubernetes Security and Observability. A Holistic Approach to Securing Containers and Cloud Native Applications. 1st Ed.
244761
Brendan Creane, Amit Gupta
2'000 ₴
Hacking Kubernetes: Threat-Driven Analysis and Defense. 1st Ed.
244753
Andrew Martin, Michael Hausenblas
2'100 ₴