Books > Computing & IT > Computer communications & networking > Network security
|
Buy Now
Securing Network Infrastructure - Discover practical network security with Nmap and Nessus 7 (Paperback)
Loot Price: R1,417
Discovery Miles 14 170
|
|
Securing Network Infrastructure - Discover practical network security with Nmap and Nessus 7 (Paperback)
Expected to ship within 10 - 15 working days
|
Plug the gaps in your network's infrastructure with resilient
network security models Key Features Develop a cost-effective and
end-to-end vulnerability management program Explore best practices
for vulnerability scanning and risk assessment Understand and
implement network enumeration with Nessus and Network Mapper (Nmap)
Book DescriptionDigitization drives technology today, which is why
it's so important for organizations to design security mechanisms
for their network infrastructures. Analyzing vulnerabilities is one
of the best ways to secure your network infrastructure. This
Learning Path begins by introducing you to the various concepts of
network security assessment, workflows, and architectures. You will
learn to employ open source tools to perform both active and
passive network scanning and use these results to analyze and
design a threat model for network security. With a firm
understanding of the basics, you will then explore how to use
Nessus and Nmap to scan your network for vulnerabilities and open
ports and gain back door entry into a network. As you progress
through the chapters, you will gain insights into how to carry out
various key scanning tasks, including firewall detection, OS
detection, and access management to detect vulnerabilities in your
network. By the end of this Learning Path, you will be familiar
with the tools you need for network scanning and techniques for
vulnerability scanning and network protection. This Learning Path
includes content from the following Packt books: Network Scanning
Cookbook by Sairam Jetty Network Vulnerability Assessment by Sagar
Rahalkar What you will learn Explore various standards and
frameworks for vulnerability assessments and penetration testing
Gain insight into vulnerability scoring and reporting Discover the
importance of patching and security hardening Develop metrics to
measure the success of a vulnerability management program Perform
configuration audits for various platforms using Nessus Write
custom Nessus and Nmap scripts on your own Install and configure
Nmap and Nessus in your network infrastructure Perform host
discovery to identify network devices Who this book is forThis
Learning Path is designed for security analysts, threat analysts,
and security professionals responsible for developing a network
threat model for an organization. Professionals who want to be part
of a vulnerability management team and implement an end-to-end
robust vulnerability management program will also find this
Learning Path useful.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
You might also like..
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.