

The Ultimate Kali Linux Book. Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire (Audiobook)


The Ultimate Kali Linux Book. Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire (Audiobook) - Najlepsze oferty
The Ultimate Kali Linux Book. Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire (Audiobook) - Opis
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks.This audiobook is a comprehensive guide for those who are new to Kali Linux and penetration testing that will have you up to speed in no time. Using real-world scenarios, you’ll understand how to set up a lab and explore core penetration testing concepts. Throughout this book, you’ll focus on information gathering and even discover different vulnerability assessment tools bundled in Kali Linux. You’ll learn to discover target systems on a network, identify security flaws on devices, exploit security weaknesses and gain access to networks, set up Command and Control (C2) operations, and perform web application penetration testing. In this updated second edition, you’ll be able to compromise Active Directory and exploit enterprise networks. Finally, this audiobook covers best practices for performing complex web penetration testing techniques in a highly secured environment.By the end of this Kali Linux audiobook, you’ll have gained the skills to perform advanced penetration testing on enterprise networks using Kali Linux. Spis treści: 1. Opening Credits2. Contributors3. Preface4. Chapter 1: Introduction to Ethical Hacking5. Chapter 2: Building a Penetration Testing Lab6. Chapter 3: Setting Up for Advanced Hacking Techniques7. Chapter 4: Reconnaissance and (...) więcej Footprinting Part 18. Chapter 4: Reconnaissance and Footprinting Part 29. Chapter 5: Exploring Active Information Gathering Part 110. Chapter 5: Exploring Active Information Gathering Part 211. Chapter 6: Performing Vulnerability Assessments12. Chapter 7: Understanding Network Penetration Testing13. Chapter 8: Performing Network Penetration Testing Part 114. Chapter 8: Performing Network Penetration Testing Part 215. Chapter 9: Advanced Network Penetration Testing - Post Exploitation16. Chapter 10: Working with Active Directory Attacks17. Chapter 11: Advanced Active Directory Attacks18. Chapter 12: Delving into Command and Control Tactics19. Chapter 13: Advanced Wireless Penetration Testing Part 120. Chapter 13: Advanced Wireless Penetration Testing Part 221. Chapter 14: Performing Client-Side Attacks - Social Engineering22. Chapter 15: Understanding Website Application Security23. Chapter 16: Advanced Website Penetration Testing24. Chapter 17: Best Practices for the Real World25. Closing Credits O autorze: Glen D. Singh zajmuje się cyberbezpieczeństwem, taktykami obronnymi i sieciami korporacyjnymi. Zdobył liczne certyfikaty, między innymi CEH, CHFI, PAWSP, a także trzy certyfikaty CCNA (CyberOps, Security, Routing and Switching). Napisał wiele książek dotyczących wykrywania i wykorzystywania podatności, analizy włamań, reakcji na incydenty i implementowania zabezpieczeń. mniejThe Ultimate Kali Linux Book. Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire (Audiobook) - Opinie i recenzje
Na liście znajdują się opinie, które zostały zweryfikowane (potwierdzone zakupem) i oznaczone są one zielonym znakiem Zaufanych Opinii. Opinie niezweryfikowane nie posiadają wskazanego oznaczenia.