Cargando…

Learn social engineering from scratch /

"Welcome to this comprehensive course on social engineering! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking, we will start with the basics of social engineering, and by end of it you'll be at an advanced level being able to hack...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : Packt Publishing, 2018.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a2200000 i 4500
001 OR_on1038802238
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cna||||||||
007 vz czazuu
008 180606s2018 xx 722 o vleng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d UAB  |d ERF  |d OCLCO  |d OCLCQ  |d OCLCO 
029 1 |a AU@  |b 000067116620 
035 |a (OCoLC)1038802238 
037 |a CL0500000969  |b Safari Books Online 
050 4 |a QA76.9.A25 
049 |a UAMI 
100 1 |a Sabih, Zaid,  |e on-screen presenter. 
245 1 0 |a Learn social engineering from scratch /  |c Zaid Sabih. 
264 1 |a [Place of publication not identified] :  |b Packt Publishing,  |c 2018. 
300 |a 1 online resource (1 streaming video file (12 hr., 1 min., 15 sec.)) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
337 |a video  |b v  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
511 0 |a Presenter, Zaid Sabih. 
500 |a Title from resource description page (Safari, viewed June 5, 2018). 
520 |a "Welcome to this comprehensive course on social engineering! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking, we will start with the basics of social engineering, and by end of it you'll be at an advanced level being able to hack into all major operating systems (Windows, OS X, and Linux), generate different types of trojans, and deliver them using smart social engineering techniques. This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into penetration testing, you will first learn how to set up a lab and install needed software to practice penetration testing safely on your own machine. Finally, at the end of the course, you will learn how to protect yourself and your systems from these attacks. All the attacks in this course are practical attacks that work against real computers. In each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real-life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adapt them to different scenarios and different operating systems."--Resource description page 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Social engineering. 
650 0 |a Penetration testing (Computer security) 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Ingénierie sociale. 
650 6 |a Tests d'intrusion. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Penetration testing (Computer security)  |2 fast  |0 (OCoLC)fst01789566 
650 7 |a Social engineering.  |2 fast  |0 (OCoLC)fst01122444 
655 4 |a Electronic videos. 
856 4 0 |u https://learning.oreilly.com/videos/~/9781789341584/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP