Ethical Hacking Workshop. Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity - Helion

Tytuł oryginału: Ethical Hacking Workshop. Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
ISBN: 9781804613047
stron: 220, Format: ebook
Data wydania: 2023-11-01
Księgarnia: Helion
Cena książki: 39,90 zł (poprzednio: 147,78 zł)
Oszczędzasz: 73% (-107,88 zł)
The Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools.
By exploring the thought process involved in ethical hacking and the various techniques you can use to obtain results, you'll gain a deep understanding of how to leverage these skills effectively.
Throughout this book, you'll learn how to conduct a successful ethical hack, how to use the tools correctly, and how to interpret the results to enhance your environment's security.
By the end of the book, you'll be well-versed in ethical hacking and equipped with the skills and knowledge necessary to safeguard your enterprise against cyber-attacks.
Osoby które kupowały "Ethical Hacking Workshop. Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity", wybierały także:
- The Ansible Workshop. Hands-On Learning For Rapid Mastery 665,00 zł, (39,90 zł -94%)
- Cisco CCNA 200-301. Kurs video. Administrowanie bezpieczeństwem sieci. Część 3 665,00 zł, (39,90 zł -94%)
- Cisco CCNA 200-301. Kurs video. Administrowanie urządzeniami Cisco. Część 2 665,00 zł, (39,90 zł -94%)
- Cisco CCNA 200-301. Kurs video. Podstawy sieci komputerowych i konfiguracji. Część 1 665,00 zł, (39,90 zł -94%)
- Jak zhakowa 125,00 zł, (10,00 zł -92%)
Spis treści
Ethical Hacking Workshop. Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity eBook -- spis treści
- 1. Networking Primer
- 2. Capturing and Analyzing Network Traffic
- 3. A Cryptography Primer
- 4. Reconnaissance
- 5. Scanning
- 6. Gaining Access
- 7. Post-Exploitation





