Articoli correlati a Ethical Hacking Workshop: Explore a practical approach...

Ethical Hacking Workshop: Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity - Brossura

 
9781804612590: Ethical Hacking Workshop: Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity

Sinossi

Get a hands-on training and experience in tools, techniques, and best practices for effective ethical hacking to combat cyber threats at any scale

Key Features

  • Use the ethical hacking methodology and thought process to perform a successful ethical hack
  • Explore the various stages of an ethical hack and the tools related to each phase
  • Purchase of the print or Kindle book includes a free PDF eBook

Book Description

The Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools.

By exploring the thought process involved in ethical hacking and the various techniques you can use to obtain results, you'll gain a deep understanding of how to leverage these skills effectively.

Throughout this book, you'll learn how to conduct a successful ethical hack, how to use the tools correctly, and how to interpret the results to enhance your environment's security. Hands-on exercises at the end of each chapter will ensure that you solidify what you've learnt and get experience with the tools.

By the end of the book, you'll be well-versed in ethical hacking and equipped with the skills and knowledge necessary to safeguard your enterprise against cyber-attacks.

What you will learn

  • Understand the key differences between encryption algorithms, hashing algorithms, and cryptography standards
  • Capture and analyze network traffic
  • Get to grips with the best practices for performing in-cloud recon
  • Get start with performing scanning techniques and network mapping
  • Leverage various top tools to perform privilege escalation, lateral movement, and implant backdoors
  • Find out how to clear tracks and evade detection

Who this book is for

This book is for cybersecurity professionals who already work as part of a security team, blue team, purple team or as a security analyst and want to become familiar with the same skills and tools that potential attackers may use to breach your system and identify security vulnerabilities. A solid understanding of cloud computing and networking is a prerequisite.

Table of Contents

  1. Networking Primer
  2. Capturing and Analyzing Network Traffic
  3. A Cryptography Primer
  4. Reconnaissance
  5. Scanning
  6. Gaining Access
  7. Post-Exploitation

Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.

Informazioni sull?autore

Rishalin Pillay is an Offensive Cybersecurity expert who holds a number of awards and certifications from multiple companies in the Cybersecurity industry. He is well known for his contributions to online learning courses related to Red Teaming and as the author of Learn Penetration Testing. He holds Content Publisher Gold and Platinum awards for his contributions made towards the Cybersecurity Industry, including the Events Speaker Gold award for influential public speaking at Tier-1 business events.<br /><br />Mohammed Abutheraa is Cybersecurity specialist who has over 15 years of experience in IT security, risk management, security infrastructure, and technology implementation in both private and public sector environments. He worked as Incident Response and Remediation Advisor and supported customers remediating against major incidents in the last years. He has experience in Threat Intelligence and Proactive Services like Vulnerability Assessments and Red / Purple Teaming experiences.

Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.

EUR 7,73 per la spedizione da U.S.A. a Italia

Destinazione, tempi e costi

Risultati della ricerca per Ethical Hacking Workshop: Explore a practical approach...

Foto dell'editore

Pillay, Rishalin; Abutheraa, Mohammed
Editore: Packt Publishing, 2023
ISBN 10: 1804612596 ISBN 13: 9781804612590
Nuovo Brossura

Da: California Books, Miami, FL, U.S.A.

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: New. Codice articolo I-9781804612590

Contatta il venditore

Compra nuovo

EUR 53,94
Convertire valuta
Spese di spedizione: EUR 7,73
Da: U.S.A. a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Foto dell'editore

Rishalin Pillay
Editore: Packt Publishing Limited, 2023
ISBN 10: 1804612596 ISBN 13: 9781804612590
Nuovo PAP
Print on Demand

Da: PBShop.store US, Wood Dale, IL, U.S.A.

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

PAP. Condizione: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Codice articolo L0-9781804612590

Contatta il venditore

Compra nuovo

EUR 60,54
Convertire valuta
Spese di spedizione: EUR 1,92
Da: U.S.A. a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Foto dell'editore

Rishalin Pillay
Editore: Packt Publishing Limited, 2023
ISBN 10: 1804612596 ISBN 13: 9781804612590
Nuovo PAP
Print on Demand

Da: PBShop.store UK, Fairford, GLOS, Regno Unito

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

PAP. Condizione: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Codice articolo L0-9781804612590

Contatta il venditore

Compra nuovo

EUR 57,44
Convertire valuta
Spese di spedizione: EUR 5,82
Da: Regno Unito a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Immagini fornite dal venditore

Pillay, Rishalin
ISBN 10: 1804612596 ISBN 13: 9781804612590
Nuovo Paperback or Softback

Da: BargainBookStores, Grand Rapids, MI, U.S.A.

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Paperback or Softback. Condizione: New. Ethical Hacking Workshop: Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity 0.85. Book. Codice articolo BBS-9781804612590

Contatta il venditore

Compra nuovo

EUR 52,46
Convertire valuta
Spese di spedizione: EUR 11,59
Da: U.S.A. a: Italia
Destinazione, tempi e costi

Quantità: 5 disponibili

Aggiungi al carrello

Foto dell'editore

Pillay, Rishalin; Abutheraa, Mohammed
Editore: Packt Publishing, 2023
ISBN 10: 1804612596 ISBN 13: 9781804612590
Nuovo Brossura

Da: Ria Christie Collections, Uxbridge, Regno Unito

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: New. In. Codice articolo ria9781804612590_new

Contatta il venditore

Compra nuovo

EUR 54,83
Convertire valuta
Spese di spedizione: EUR 10,38
Da: Regno Unito a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Immagini fornite dal venditore

Rishalin Pillay, Mohammed Abutheraa
ISBN 10: 1804612596 ISBN 13: 9781804612590
Nuovo Paperback

Da: Rarewaves.com UK, London, Regno Unito

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Paperback. Condizione: New. As cyber-attacks grow and APT groups advance their skillset, you need to be able to protect your enterprise against cyber-attacks. In order to limit your attack surface, you need to ensure that you leverage the same skills and tools that an adversary may use to hack your environment and discover the security gaps. This book will teach you how to think like a hacker, use state-of-the-art hacking tools, and protect yourself and your organizaiton. Codice articolo LU-9781804612590

Contatta il venditore

Compra nuovo

EUR 64,58
Convertire valuta
Spese di spedizione: EUR 2,31
Da: Regno Unito a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Immagini fornite dal venditore

Rishalin Pillay, Mohammed Abutheraa
ISBN 10: 1804612596 ISBN 13: 9781804612590
Nuovo Paperback

Da: Rarewaves.com USA, London, LONDO, Regno Unito

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Paperback. Condizione: New. As cyber-attacks grow and APT groups advance their skillset, you need to be able to protect your enterprise against cyber-attacks. In order to limit your attack surface, you need to ensure that you leverage the same skills and tools that an adversary may use to hack your environment and discover the security gaps. This book will teach you how to think like a hacker, use state-of-the-art hacking tools, and protect yourself and your organizaiton. Codice articolo LU-9781804612590

Contatta il venditore

Compra nuovo

EUR 69,71
Convertire valuta
Spese di spedizione: EUR 2,31
Da: Regno Unito a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Foto dell'editore

Rishalin Pillay
Editore: Packt Publishing Limited, 2023
ISBN 10: 1804612596 ISBN 13: 9781804612590
Nuovo Paperback / softback
Print on Demand

Da: THE SAINT BOOKSTORE, Southport, Regno Unito

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Paperback / softback. Condizione: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 526. Codice articolo C9781804612590

Contatta il venditore

Compra nuovo

EUR 63,39
Convertire valuta
Spese di spedizione: EUR 10,04
Da: Regno Unito a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Immagini fornite dal venditore

Rishalin Pillay
Editore: Packt Publishing, 2023
ISBN 10: 1804612596 ISBN 13: 9781804612590
Nuovo Taschenbuch
Print on Demand

Da: AHA-BUCH GmbH, Einbeck, Germania

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Taschenbuch. Condizione: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Get a hands-on training and experience in tools, techniques, and best practices for effective ethical hacking to combat cyber threats at any scaleKey FeaturesUse the ethical hacking methodology and thought process to perform a successful ethical hackExplore the various stages of an ethical hack and the tools related to each phasePurchase of the print or Kindle book includes a free PDF Elektronisches BuchBook DescriptionThe Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools.By exploring the thought process involved in ethical hacking and the various techniques you can use to obtain results, you'll gain a deep understanding of how to leverage these skills effectively.Throughout this book, you'll learn how to conduct a successful ethical hack, how to use the tools correctly, and how to interpret the results to enhance your environment's security. Hands-on exercises at the end of each chapter will ensure that you solidify what you've learnt and get experience with the tools.By the end of the book, you'll be well-versed in ethical hacking and equipped with the skills and knowledge necessary to safeguard your enterprise against cyber-attacks.What you will learnUnderstand the key differences between encryption algorithms, hashing algorithms, and cryptography standardsCapture and analyze network trafficGet to grips with the best practices for performing in-cloud reconGet start with performing scanning techniques and network mappingLeverage various top tools to perform privilege escalation, lateral movement, and implant backdoorsFind out how to clear tracks and evade detectionWho this book is forThis book is for cybersecurity professionals who already work as part of a security team, blue team, purple team or as a security analyst and want to become familiar with the same skills and tools that potential attackers may use to breach your system and identify security vulnerabilities. A solid understanding of cloud computing and networking is a prerequisite.Table of ContentsNetworking PrimerCapturing and Analyzing Network TrafficA Cryptography PrimerReconnaissanceScanningGaining AccessPost-Exploitation. Codice articolo 9781804612590

Contatta il venditore

Compra nuovo

EUR 77,01
Convertire valuta
Spese di spedizione: EUR 14,99
Da: Germania a: Italia
Destinazione, tempi e costi

Quantità: 1 disponibili

Aggiungi al carrello

Foto dell'editore

Pillay, Rishalin; Abutheraa, Mohammed
Editore: Packt Publishing, 2023
ISBN 10: 1804612596 ISBN 13: 9781804612590
Nuovo Brossura

Da: Books Puddle, New York, NY, U.S.A.

Valutazione del venditore 4 su 5 stelle 4 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: New. Codice articolo 26395955139

Contatta il venditore

Compra nuovo

EUR 88,77
Convertire valuta
Spese di spedizione: EUR 7,73
Da: U.S.A. a: Italia
Destinazione, tempi e costi

Quantità: 4 disponibili

Aggiungi al carrello

Vedi altre 3 copie di questo libro

Vedi tutti i risultati per questo libro