|
|
|
|
LEADER |
00000cgm a2200000 i 4500 |
001 |
OR_on1003645525 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
cr cna|||||||| |
007 |
vz czazuu |
008 |
170914s2018 xx 278 o vleng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d UMI
|d OCLCF
|d OCLCA
|d UAB
|d OCLCQ
|d OCLCO
|
035 |
|
|
|a (OCoLC)1003645525
|
037 |
|
|
|a CL0500000891
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Santos, Omar,
|e on-screen presenter.
|
245 |
1 |
0 |
|a Security penetration testing (The art of hacking series) /
|c Omar Santos, Chris McCoy, Ron Taylor, & Jon Sternstein.
|
264 |
|
1 |
|a [Place of publication not identified] :
|b Pearson,
|c [2018]
|
264 |
|
4 |
|c ©2018
|
300 |
|
|
|a 1 online resource (1 streaming video file (4 hr., 37 min., 51 sec.))
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
337 |
|
|
|a video
|b v
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
511 |
0 |
|
|a Presenters, Omar Santos, Chris McCoy, Ron Taylor, and Jon Sternstein.
|
500 |
|
|
|a Title from title screen (viewed September 13, 2017).
|
520 |
|
|
|a "This course is a complete guide to help you get up and running with your cybersecurity career. You will learn the key tenets and basics of ethical hacking and security penetration testing techniques. You will also explore professional networking and security topics, including an introduction to the world of white hat hacking, reconnaissance, Kali Linux, and exploitation. This course provides step-by-step real-life scenarios. You will see first hand how an ethical hacker performs initial reconnaissance of a victim and how to assess systems and network security controls security posture. With over 10 hours of training that includes live discussions, demos, whiteboard instruction and screencasts, Security Penetration Testing Live Lessons provides expert insights of the methodologies used to assess and compromise a network. It covers the legal aspects of ethical hacking and the associated risks. This course additionally reviews many different tools that can be used to penetrate a wired and wireless network and the systems within that network. The title also covers numerous types of attacks, along with security evasion and post exploitation techniques. You will additionally learn the art of social engineering, with special coverage of tools like the social engineering tool kit (SET), Metasploit, Maltego, and many more. After that you'll take a look at guidelines for how to write a penetration testing report, with instructions for how to plan and organize those reports examples of reports including several best practices."--Resource description page
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Hackers.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Pirates informatiques.
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Hackers.
|2 fast
|0 (OCoLC)fst00872150
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|0 (OCoLC)fst01789566
|
700 |
1 |
|
|a McCoy, Chris,
|e on-screen presenter.
|
700 |
1 |
|
|a Taylor, Ron,
|e on-screen presenter.
|
700 |
1 |
|
|a Sternstein, Jon,
|e on-screen presenter.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9780134833989/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|