|
Showing 1 - 9 of
9 matches in All Departments
Use real-world reconnaissance techniques to efficiently gather
sensitive information on systems and networks Purchase of the print
or Kindle book includes a free PDF eBook Key Features Learn how
adversaries use reconnaissance techniques to discover security
vulnerabilities on systems Develop advanced open source
intelligence capabilities to find sensitive information Explore
automated reconnaissance and vulnerability assessment tools to
profile systems and networks Book DescriptionThis book explores
reconnaissance techniques – the first step in discovering
security vulnerabilities and exposed network infrastructure. It
aids ethical hackers in understanding adversaries’ methods of
identifying and mapping attack surfaces, such as network entry
points, which enables them to exploit the target and steal
confidential information. Reconnaissance for Ethical Hackers helps
you get a comprehensive understanding of how threat actors are able
to successfully leverage the information collected during the
reconnaissance phase to scan and enumerate the network, collect
information, and pose various security threats. This book helps you
stay one step ahead in knowing how adversaries use tactics,
techniques, and procedures (TTPs) to successfully gain information
about their targets, while you develop a solid foundation on
information gathering strategies as a cybersecurity professional.
The concluding chapters will assist you in developing the skills
and techniques used by real adversaries to identify vulnerable
points of entry into an organization and mitigate
reconnaissance-based attacks. By the end of this book, you’ll
have gained a solid understanding of reconnaissance, as well as
learned how to secure yourself and your organization without
causing significant disruption.What you will learn Understand the
tactics, techniques, and procedures of reconnaissance Grasp the
importance of attack surface management for organizations Find out
how to conceal your identity online as an ethical hacker Explore
advanced open source intelligence (OSINT) techniques Perform active
reconnaissance to discover live hosts and exposed ports Use
automated tools to perform vulnerability assessments on systems
Discover how to efficiently perform reconnaissance on web
applications Implement open source threat detection and monitoring
tools Who this book is forIf you are an ethical hacker, a
penetration tester, red teamer, or any cybersecurity professional
looking to understand the impact of reconnaissance-based attacks,
how they take place, and what organizations can do to protect
against them, then this book is for you. Cybersecurity
professionals will find this book useful in determining the attack
surface of their organizations and assets on their network, while
understanding the behavior of adversaries.
Become a network specialist by developing your skills in network
implementation, operations and security while covering all the exam
topics for CompTIA Network+ N10-008 certification in an
easy-to-follow guide. Purchase of the print or Kindle book includes
a free eBook in the PDF format. Key Features A step-by-step guide
to gaining a clear understanding of the Network+ certification
Learn about network architecture, protocols, security, and network
troubleshooting Confidently ace the N10-008 exam with the help of
200+ practice test questions and answers Book DescriptionThis book
helps you to easily understand core networking concepts without the
need of prior industry experience or knowledge within this fi eld
of study. This updated second edition of the CompTIA Network+
N10-008 Certification Guide begins by introducing you to the core
fundamentals of networking technologies and concepts, before
progressing to intermediate and advanced topics using a
student-centric approach. You'll explore best practices for
designing and implementing a resilient and scalable network
infrastructure to support modern applications and services.
Additionally, you'll learn network security concepts and
technologies to effectively secure organizations from cyber attacks
and threats. The book also shows you how to efficiently discover
and resolve networking issues using common troubleshooting
techniques. By the end of this book, you'll have gained sufficient
knowledge to efficiently design, implement, and maintain a network
infrastructure as a successful network professional within the
industry. You'll also have gained knowledge of all the official
CompTIA Network+ N10-008 exam objectives, networking technologies,
and how to apply your skills in the real world. What you will learn
Explore common networking concepts, services, and architecture
Identify common cloud architecture and virtualization concepts
Discover routing and switching technologies Implement wireless
technologies and solutions Understand network security concepts to
mitigate cyber attacks Explore best practices to harden networks
from threats Use best practices to discover and resolve common
networking issues Who this book is forThis book is for students,
network administrators, network engineers, NOC engineers, systems
administrators, cybersecurity professionals, and enthusiasts. No
prior knowledge in networking is required to get started with this
book.
Explore the latest ethical hacking tools and techniques to perform
penetration testing from scratch Purchase of the print or Kindle
book includes a free eBook in the PDF format Key Features Learn to
compromise enterprise networks with Kali Linux Gain comprehensive
insights into security concepts using advanced real-life hacker
techniques Use Kali Linux in the same way ethical hackers and
penetration testers do to gain control of your environment Book
DescriptionKali Linux is the most popular and advanced penetration
testing Linux distribution within the cybersecurity industry. Using
Kali Linux, a cybersecurity professional will be able to discover
and exploit various vulnerabilities and perform advanced
penetration testing on both enterprise wired and wireless networks.
This book is a comprehensive guide for those who are new to Kali
Linux and penetration testing that will have you up to speed in no
time. Using real-world scenarios, you'll understand how to set up a
lab and explore core penetration testing concepts. Throughout this
book, you'll focus on information gathering and even discover
different vulnerability assessment tools bundled in Kali Linux.
You'll learn to discover target systems on a network, identify
security flaws on devices, exploit security weaknesses and gain
access to networks, set up Command and Control (C2) operations, and
perform web application penetration testing. In this updated second
edition, you'll be able to compromise Active Directory and exploit
enterprise networks. Finally, this book covers best practices for
performing complex web penetration testing techniques in a highly
secured environment. By the end of this Kali Linux book, you'll
have gained the skills to perform advanced penetration testing on
enterprise networks using Kali Linux. What you will learn Explore
the fundamentals of ethical hacking Understand how to install and
configure Kali Linux Perform asset and network discovery techniques
Focus on how to perform vulnerability assessments Exploit the trust
in Active Directory domain services Perform advanced exploitation
with Command and Control (C2) techniques Implement advanced
wireless hacking techniques Become well-versed with exploiting
vulnerable web applications Who this book is forThis pentesting
book is for students, trainers, cybersecurity professionals, cyber
enthusiasts, network security professionals, ethical hackers,
penetration testers, and security engineers. If you do not have any
prior knowledge and are looking to become an expert in penetration
testing using the Kali Linux operating system (OS), then this book
is for you.
Begin a successful career in cybersecurity operations by achieving
Cisco Certified CyberOps Associate 200-201 certification Key
Features Receive expert guidance on how to kickstart your career in
the cybersecurity industry Gain hands-on experience while studying
for the Cisco Certified CyberOps Associate certification exam Work
through practical labs and exercises mapped directly to the exam
objectives Book DescriptionAchieving the Cisco Certified CyberOps
Associate 200-201 certification helps you to kickstart your career
in cybersecurity operations. This book offers up-to-date coverage
of 200-201 exam resources to fully equip you to pass on your first
attempt. The book covers the essentials of network security
concepts and shows you how to perform security threat monitoring.
You'll begin by gaining an in-depth understanding of cryptography
and exploring the methodology for performing both host and
network-based intrusion analysis. Next, you'll learn about the
importance of implementing security management and incident
response strategies in an enterprise organization. As you advance,
you'll see why implementing defenses is necessary by taking an
in-depth approach, and then perform security monitoring and packet
analysis on a network. You'll also discover the need for computer
forensics and get to grips with the components used to identify
network intrusions. Finally, the book will not only help you to
learn the theory but also enable you to gain much-needed practical
experience for the cybersecurity industry. By the end of this Cisco
cybersecurity book, you'll have covered everything you need to pass
the Cisco Certified CyberOps Associate 200-201 certification exam,
and have a handy, on-the-job desktop reference guide. What you will
learn Incorporate security into your architecture to prevent
attacks Discover how to implement and prepare secure designs
Identify access control models for digital assets Identify point of
entry, determine scope, contain threats, and remediate Find out how
to perform malware analysis and interpretation Implement security
technologies to detect and analyze threats Who this book is forThis
book is for students who want to pursue a career in cybersecurity
operations, threat detection and analysis, and incident response.
IT professionals, network security engineers, security operations
center (SOC) engineers, and cybersecurity analysts looking for a
career boost and those looking to get certified in Cisco
cybersecurity technologies and break into the cybersecurity
industry will also benefit from this book. No prior knowledge of IT
networking and cybersecurity industries is needed.
Prepare to take the Cisco Certified Network Associate (200-301
CCNA) exam and get to grips with the essentials of networking,
security, and automation Key Features Secure your future in network
engineering with this intensive boot camp-style certification guide
Gain knowledge of the latest trends in Cisco networking and
security and boost your career prospects Design and implement a
wide range of networking technologies and services using Cisco
solutions Book DescriptionIn the dynamic technology landscape,
staying on top of the latest technology trends is a must,
especially if you want to build a career in network administration.
Achieving CCNA 200-301 certification will validate your knowledge
of networking concepts, and this book will help you to do just
that. This exam guide focuses on the fundamentals to help you gain
a high-level understanding of networking, security, IP
connectivity, IP services, programmability, and automation.
Starting with the functions of various networking components,
you'll discover how they are used to build and improve an
enterprise network. You'll then delve into configuring networking
devices using a command-line interface (CLI) to provide network
access, services, security, connectivity, and management. The book
covers important aspects of network engineering using a variety of
hands-on labs and real-world scenarios that will help you gain
essential practical skills. As you make progress, this CCNA
certification study guide will help you get to grips with the
solutions and technologies that you need to implement and
administer a broad range of modern networks and IT infrastructures.
By the end of this book, you'll have gained the confidence to pass
the Cisco CCNA 200-301 exam on the first attempt and be well-versed
in a variety of network administration and security engineering
solutions. What you will learn Understand the benefits of creating
an optimal network Create and implement IP schemes in an enterprise
network Design and implement virtual local area networks (VLANs)
Administer dynamic routing protocols, network security, and
automation Get to grips with various IP services that are essential
to every network Discover how to troubleshoot networking devices
Who this book is forThis guide is for IT professionals looking to
boost their network engineering and security administration career
prospects. If you want to gain a Cisco CCNA certification and start
a career as a network security professional, you'll find this book
useful. Although no knowledge about Cisco technologies is expected,
a basic understanding of industry-level network fundamentals will
help you grasp the topics covered easily.
Convert Android to a powerful pentesting platform. Key Features Get
up and running with Kali Linux NetHunter Connect your Android
device and gain full control over Windows, OSX, or Linux devices
Crack Wi-Fi passwords and gain access to devices connected over the
same network collecting intellectual data Book DescriptionKali
NetHunter is a version of the popular and powerful Kali Linux
pentesting platform, designed to be installed on mobile devices.
Hands-On Penetration Testing with Kali NetHunter will teach you the
components of NetHunter and how to install the software. You'll
also learn about the different tools included and how to optimize
and use a package, obtain desired results, perform tests, and make
your environment more secure. Starting with an introduction to Kali
NetHunter, you will delve into different phases of the pentesting
process. This book will show you how to build your penetration
testing environment and set up your lab. You will gain insight into
gathering intellectual data, exploiting vulnerable areas, and
gaining control over target systems. As you progress through the
book, you will explore the NetHunter tools available for exploiting
wired and wireless devices. You will work through new ways to
deploy existing tools designed to reduce the chances of detection.
In the concluding chapters, you will discover tips and best
practices for integrating security hardening into your Android
ecosystem. By the end of this book, you will have learned to
successfully use a mobile penetration testing device based on Kali
NetHunter and Android to accomplish the same tasks you would
traditionally, but in a smaller and more mobile form factor. What
you will learn Choose and configure a hardware device to use Kali
NetHunter Use various tools during pentests Understand NetHunter
suite components Discover tips to effectively use a compact mobile
platform Create your own Kali NetHunter-enabled device and
configure it for optimal results Learn to scan and gather
information from a target Explore hardware adapters for testing and
auditing wireless networks and Bluetooth devices Who this book is
forHands-On Penetration Testing with Kali NetHunter is for
pentesters, ethical hackers, and security professionals who want to
learn to use Kali NetHunter for complete mobile penetration testing
and are interested in venturing into the mobile domain. Some prior
understanding of networking assessment and Kali Linux will be
helpful.
Explore the latest ethical hacking tools and techniques in Kali
Linux 2019 to perform penetration testing from scratch Key Features
Get up and running with Kali Linux 2019.2 Gain comprehensive
insights into security concepts such as social engineering,
wireless network exploitation, and web application attacks Learn to
use Linux commands in the way ethical hackers do to gain control of
your environment Book DescriptionThe current rise in hacking and
security breaches makes it more important than ever to effectively
pentest your environment, ensuring endpoint protection. This book
will take you through the latest version of Kali Linux and help you
use various tools and techniques to efficiently deal with crucial
security aspects. Through real-world examples, you'll understand
how to set up a lab and later explore core penetration testing
concepts. Throughout the course of this book, you'll get up to
speed with gathering sensitive information and even discover
different vulnerability assessment tools bundled in Kali Linux
2019. In later chapters, you'll gain insights into concepts such as
social engineering, attacking wireless networks, exploitation of
web applications and remote access connections to further build on
your pentesting skills. You'll also focus on techniques such as
bypassing controls, attacking the end user and maintaining
persistence access through social media. Finally, this pentesting
book covers best practices for performing complex penetration
testing techniques in a highly secured environment. By the end of
this book, you'll be able to use Kali Linux to detect
vulnerabilities and secure your system by applying penetration
testing techniques of varying complexity. What you will learn
Explore the fundamentals of ethical hacking Learn how to install
and configure Kali Linux Get up to speed with performing wireless
network pentesting Gain insights into passive and active
information gathering Understand web application pentesting Decode
WEP, WPA, and WPA2 encryptions using a variety of methods, such as
the fake authentication attack, the ARP request replay attack, and
the dictionary attack Who this book is forIf you are an IT security
professional or a security consultant who wants to get started with
penetration testing using Kali Linux 2019.2, then this book is for
you. The book will also help if you're simply looking to learn more
about ethical hacking and various security breaches. Although prior
knowledge of Kali Linux is not necessary, some understanding of
cybersecurity will be useful.
This is a practical certification guide covering all the exam
topics in an easy-to-follow manner backed with self-assessment
scenarios for better preparation. Key Features A step-by-step guide
to give you a clear understanding of the Network+ Certification
Learn about network architecture, protocols, security, and network
troubleshooting Confidently ace the N10-007 exam with the help of
practice tests Book DescriptionCompTIA certified professionals have
always had the upper hand in the information technology industry.
This book will be your ideal guide to efficiently passing and
achieving this certification. Learn from industry experts and
implement their practices to resolve complex IT issues. This book
revolves around networking concepts where readers will learn topics
like network architecture, security, network monitoring, and
troubleshooting. This book will not only prepare the readers
conceptually but will also help them pass the N10-007 exam. This
guide will also provide practice exercise after every chapter where
readers can ensure their concepts are clear. By the end of this
book, readers will leverage this guide and the included practice
questions to boost their confidence in appearing for the actual
certificate. What you will learn Explain the purpose of a variety
of networking concepts and implement them appropriately Understand
physical security and common attacks while securing wired and
wireless networks Understand the fundamentals of IPv4 and IPv6
Determine and explain the appropriate cabling, device, and storage
technologies Understand network troubleshooting methodology and
appropriate tools to support connectivity and performance Use best
practices to manage the network, determine policies, and ensure
business continuity Who this book is forThis book is ideal for
readers wanting to pass the CompTIA Network+ certificate. Rookie
network engineers and system administrators interested in enhancing
their networking skills would also benefit from this book. No Prior
knowledge on networking would be needed.
Become a Cisco security specialist by developing your skills in
network security and explore advanced security technologies Key
Features Enhance your skills in network security by learning about
Cisco's device configuration and installation Unlock the practical
aspects of CCNA security to secure your devices Explore tips and
tricks to help you achieve the CCNA Security 210-260 Certification
Book DescriptionWith CCNA Security certification, a network
professional can demonstrate the skills required to develop
security infrastructure, recognize threats and vulnerabilities to
networks, and mitigate security threats. The CCNA Security 210-260
Certification Guide will help you grasp the fundamentals of network
security and prepare you for the Cisco CCNA Security Certification
exam. You'll begin by getting a grip on the fundamentals of network
security and exploring the different tools available. Then, you'll
see how to securely manage your network devices by implementing the
AAA framework and configuring different management plane protocols.
Next, you'll learn about security on the data link layer by
implementing various security toolkits. You'll be introduced to
various firewall technologies and will understand how to configure
a zone-based firewall on a Cisco IOS device. You'll configure a
site-to-site VPN on a Cisco device and get familiar with different
types of VPNs and configurations. Finally, you'll delve into the
concepts of IPS and endpoint security to secure your organization's
network infrastructure. By the end of this book, you'll be ready to
take the CCNA Security Exam (210-260). What you will learn Grasp
the fundamentals of network security Configure routing protocols to
secure network devices Mitigate different styles of security
attacks using Cisco devices Explore the different types of firewall
technologies Discover the Cisco ASA functionality and gain insights
into some advanced ASA configurations Implement IPS on a Cisco
device and understand the concept of endpoint security Who this
book is forCCNA Security 210-260 Certification Guide can help you
become a network security engineer, a cyber security professional,
or a security administrator. You should have valid CCENT or CCNA
Routing and Switching certification before taking your CCNA
Security exam.
|
You may like...
Fast X
Vin Diesel
Blu-ray disc
R210
R158
Discovery Miles 1 580
Back Together
Michael Ball & Alfie Boe
CD
(1)
R48
Discovery Miles 480
|