|
Showing 1 - 4 of
4 matches in All Departments
Get to grips with network-based attacks and learn to defend your
organization's network and network devices Key Features Exploit
vulnerabilities and use custom modules and scripts to crack
authentication protocols Safeguard against web, mail, database,
DNS, voice, video, and collaboration server attacks Monitor and
protect against brute-force attacks by implementing defense
mechanisms Book DescriptionWith the increased demand for computer
systems and the ever-evolving internet, network security now plays
an even bigger role in securing IT infrastructures against attacks.
Equipped with the knowledge of how to find vulnerabilities and
infiltrate organizations through their networks, you'll be able to
think like a hacker and safeguard your organization's network and
networking devices. Network Protocols for Security Professionals
will show you how. This comprehensive guide gradually increases in
complexity, taking you from the basics to advanced concepts.
Starting with the structure of data network protocols, devices, and
breaches, you'll become familiar with attacking tools and scripts
that take advantage of these breaches. Once you've covered the
basics, you'll learn about attacks that target networks and network
devices. Your learning journey will get more exciting as you
perform eavesdropping, learn data analysis, and use behavior
analysis for network forensics. As you progress, you'll develop a
thorough understanding of network protocols and how to use methods
and tools you learned in the previous parts to attack and protect
these protocols. By the end of this network security book, you'll
be well versed in network protocol security and security
countermeasures to protect network protocols. What you will learn
Understand security breaches, weaknesses, and protection techniques
Attack and defend wired as well as wireless networks Discover how
to attack and defend LAN-, IP-, and TCP/UDP-based vulnerabilities
Focus on encryption, authorization, and authentication principles
Gain insights into implementing security protocols the right way
Use tools and scripts to perform attacks on network devices Wield
Python, PyShark, and other scripting tools for packet analysis
Identify attacks on web servers to secure web and email services
Who this book is forThis book is for red team and blue team
pentesters, security professionals, or bug hunters. Anyone involved
in network protocol management and security will also benefit from
this book. Basic experience in network security will be an added
advantage.
Over 100 recipes to analyze and troubleshoot network problems using
Wireshark 2 Key Features Place Wireshark 2 in your network and
configure it for effective network analysis Deep dive into the
enhanced functionalities of Wireshark 2 and protect your network
with ease A practical guide with exciting recipes on a widely used
network protocol analyzer Book DescriptionThis book contains
practical recipes on troubleshooting a data communications network.
This second version of the book focuses on Wireshark 2, which has
already gained a lot of traction due to the enhanced features that
it offers to users. The book expands on some of the subjects
explored in the first version, including TCP performance, network
security, Wireless LAN, and how to use Wireshark for cloud and
virtual system monitoring. You will learn how to analyze end-to-end
IPv4 and IPv6 connectivity failures for Unicast and Multicast
traffic using Wireshark. It also includes Wireshark capture files
so that you can practice what you've learned in the book. You will
understand the normal operation of E-mail protocols and learn how
to use Wireshark for basic analysis and troubleshooting. Using
Wireshark, you will be able to resolve and troubleshoot common
applications that are used in an enterprise network, like NetBIOS
and SMB protocols. Finally, you will also be able to measure
network parameters, check for network problems caused by them, and
solve them effectively. By the end of this book, you'll know how to
analyze traffic, find patterns of various offending traffic, and
secure your network from them. What you will learn Configure
Wireshark 2 for effective network analysis and troubleshooting Set
up various display and capture filters Understand networking
layers, including IPv4 and IPv6 analysis Explore performance issues
in TCP/IP Get to know about Wi-Fi testing and how to resolve
problems related to wireless LANs Get information about network
phenomena, events, and errors Locate faults in detecting security
failures and breaches in networks Who this book is forThis book is
for security professionals, network administrators, R&D,
engineering and technical support, and communications managers who
are using Wireshark for network analysis and troubleshooting. It
requires a basic understanding of networking concepts, but does not
require specific and detailed technical knowledge of protocols or
vendor implementations.
Network analysis using Wireshark Cookbook contains more than 100
practical recipes for analyzing your network and troubleshooting
problems in the network. This book provides you with simple and
practical recipes on how to solve networking problems with a
step-by-step approach. This book is aimed at research and
development professionals, engineering and technical support, and
IT and communications managers who are using Wireshark for network
analysis and troubleshooting. This book requires a basic
understanding of networking concepts, but does not require specific
and detailed technical knowledge of protocols or vendor
implementations.
Master Wireshark and discover how to analyze network packets and
protocols effectively, along with engaging recipes to troubleshoot
network problems About This Book * Gain valuable insights into the
network and application protocols, and the key fields in each
protocol * Use Wireshark's powerful statistical tools to analyze
your network and leverage its expert system to pinpoint network
problems * Master Wireshark and train it as your network sniffer
Who This Book Is For This book is aimed at IT professionals who
want to develop or enhance their packet analysis skills. A basic
familiarity with common network and application services terms and
technologies is assumed. What You Will Learn * Discover how packet
analysts view networks and the role of protocols at the packet
level * Capture and isolate all the right packets to perform a
thorough analysis using Wireshark's extensive capture and display
filtering capabilities * Decrypt encrypted wireless traffic * Use
Wireshark as a diagnostic tool and also for network security
analysis to keep track of malware * Find and resolve problems due
to bandwidth, throughput, and packet loss * Identify and locate
faults in communication applications including HTTP, FTP, mail, and
various other applications - Microsoft OS problems, databases,
voice, and video over IP * Identify and locate faults in detecting
security failures and security breaches in the network In Detail
This Learning Path starts off installing Wireshark, before
gradually taking you through your first packet capture, identifying
and filtering out just the packets of interest, and saving them to
a new file for later analysis. You will then discover different
ways to create and use capture and display filters. By halfway
through the book, you'll be mastering Wireshark features, analyzing
different layers of the network protocol, and looking for any
anomalies.We then start Ethernet and LAN switching, through IP, and
then move on to TCP/UDP with a focus on TCP performance problems.
It also focuses on WLAN security. Then, we go through application
behavior issues including HTTP, mail, DNS, and other common
protocols. This book finishes with a look at network forensics and
how to locate security problems that might harm the network.This
course provides you with highly practical content explaining
Metasploit from the following books: 1) Wireshark Essentials 2)
Network Analysis Using Wireshark Cookbook 3) Mastering Wireshark
Style and approach This step-by-step guide follows a practical
approach, starting from the basic to the advanced aspects. Through
a series of real-world examples, this learning path will focus on
making it easy for you to become an expert at using Wireshark.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
The Wonder Of You
Elvis Presley, Royal Philharmonic Orchestra
CD
R48
Discovery Miles 480
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
|