Cargando…

Security penetration testing (The art of hacking series) /

"This course is a complete guide to help you get up and running with your cybersecurity career. You will learn the key tenets and basics of ethical hacking and security penetration testing techniques. You will also explore professional networking and security topics, including an introduction t...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : Pearson, [2018]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a2200000 i 4500
001 OR_on1003645525
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cna||||||||
007 vz czazuu
008 170914s2018 xx 278 o vleng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d UMI  |d OCLCF  |d OCLCA  |d UAB  |d OCLCQ  |d OCLCO 
035 |a (OCoLC)1003645525 
037 |a CL0500000891  |b Safari Books Online 
050 4 |a QA76.9.A25 
049 |a UAMI 
100 1 |a Santos, Omar,  |e on-screen presenter. 
245 1 0 |a Security penetration testing (The art of hacking series) /  |c Omar Santos, Chris McCoy, Ron Taylor, & Jon Sternstein. 
264 1 |a [Place of publication not identified] :  |b Pearson,  |c [2018] 
264 4 |c ©2018 
300 |a 1 online resource (1 streaming video file (4 hr., 37 min., 51 sec.)) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
337 |a video  |b v  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
511 0 |a Presenters, Omar Santos, Chris McCoy, Ron Taylor, and Jon Sternstein. 
500 |a Title from title screen (viewed September 13, 2017). 
520 |a "This course is a complete guide to help you get up and running with your cybersecurity career. You will learn the key tenets and basics of ethical hacking and security penetration testing techniques. You will also explore professional networking and security topics, including an introduction to the world of white hat hacking, reconnaissance, Kali Linux, and exploitation. This course provides step-by-step real-life scenarios. You will see first hand how an ethical hacker performs initial reconnaissance of a victim and how to assess systems and network security controls security posture. With over 10 hours of training that includes live discussions, demos, whiteboard instruction and screencasts, Security Penetration Testing Live Lessons provides expert insights of the methodologies used to assess and compromise a network. It covers the legal aspects of ethical hacking and the associated risks. This course additionally reviews many different tools that can be used to penetrate a wired and wireless network and the systems within that network. The title also covers numerous types of attacks, along with security evasion and post exploitation techniques. You will additionally learn the art of social engineering, with special coverage of tools like the social engineering tool kit (SET), Metasploit, Maltego, and many more. After that you'll take a look at guidelines for how to write a penetration testing report, with instructions for how to plan and organize those reports examples of reports including several best practices."--Resource description page 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Penetration testing (Computer security) 
650 0 |a Computer security. 
650 0 |a Hackers. 
650 2 |a Computer Security 
650 6 |a Tests d'intrusion. 
650 6 |a Sécurité informatique. 
650 6 |a Pirates informatiques. 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Hackers.  |2 fast  |0 (OCoLC)fst00872150 
650 7 |a Penetration testing (Computer security)  |2 fast  |0 (OCoLC)fst01789566 
700 1 |a McCoy, Chris,  |e on-screen presenter. 
700 1 |a Taylor, Ron,  |e on-screen presenter. 
700 1 |a Sternstein, Jon,  |e on-screen presenter. 
856 4 0 |u https://learning.oreilly.com/videos/~/9780134833989/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP