Ethical Hacking Workshop : Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity

個数:

Ethical Hacking Workshop : Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 220 p.
  • 言語 ENG
  • 商品コード 9781804612590
  • DDC分類 005.8

Full Description

Get a hands-on training and experience in tools, techniques, and best practices for effective ethical hacking to combat cyber threats at any scale

Key Features

Use the ethical hacking methodology and thought process to perform a successful ethical hack
Explore the various stages of an ethical hack and the tools related to each phase
Purchase of the print or Kindle book includes a free PDF eBook

Book DescriptionThe Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools.
By exploring the thought process involved in ethical hacking and the various techniques you can use to obtain results, you'll gain a deep understanding of how to leverage these skills effectively.
Throughout this book, you'll learn how to conduct a successful ethical hack, how to use the tools correctly, and how to interpret the results to enhance your environment's security. Hands-on exercises at the end of each chapter will ensure that you solidify what you've learnt and get experience with the tools.
By the end of the book, you'll be well-versed in ethical hacking and equipped with the skills and knowledge necessary to safeguard your enterprise against cyber-attacks.What you will learn

Understand the key differences between encryption algorithms, hashing algorithms, and cryptography standards
Capture and analyze network traffic
Get to grips with the best practices for performing in-cloud recon
Get start with performing scanning techniques and network mapping
Leverage various top tools to perform privilege escalation, lateral movement, and implant backdoors
Find out how to clear tracks and evade detection

Who this book is forThis book is for cybersecurity professionals who already work as part of a security team, blue team, purple team or as a security analyst and want to become familiar with the same skills and tools that potential attackers may use to breach your system and identify security vulnerabilities. A solid understanding of cloud computing and networking is a prerequisite.

Contents

Table of Contents

Networking Primer
Capturing and Analyzing Network Traffic
A Cryptography Primer
Reconnaissance
Scanning
Gaining Access
Post-Exploitation

最近チェックした商品