Cargando…

Learn ethical hacking from scratch /

"Welcome to this comprehensive course on ethical hacking! This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install needed software to practi...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : Packt Publishing, 2018.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a2200000 i 4500
001 OR_on1043906400
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cna||||||||
007 vz czazuu
008 180711s2018 xx 760 o vleng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d S9I  |d UAB  |d ERF  |d OCLCO  |d OCLCQ  |d OCLCO 
029 1 |a AU@  |b 000067119822 
035 |a (OCoLC)1043906400 
037 |a CL0500000978  |b Safari Books Online 
050 4 |a TK5105.59 
049 |a UAMI 
100 1 |a Sabih, Zaid,  |e on-screen presenter. 
245 1 0 |a Learn ethical hacking from scratch /  |c Zaid Sabih. 
264 1 |a [Place of publication not identified] :  |b Packt Publishing,  |c 2018. 
300 |a 1 online resource (1 streaming video file (12 hr., 39 min., 32 sec.)) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
337 |a video  |b v  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
380 |a Videorecording 
511 0 |a Presenter, Zaid Sabih. 
500 |a Title from resource description page (Safari, viewed July 9, 2018). 
520 |a "Welcome to this comprehensive course on ethical hacking! This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install needed software to practice penetration testing on your own machine. All the attacks explained in this course are launched against real devices in Zaid's lab. The course is structured in a way that will take you through the basics of Linux, computer systems, networks, and how devices communicate with each other. We will start by talking about how we can exploit these systems to carry out a number of powerful attacks. This course will take you from a beginner to a more advanced level and by the time you finish, you will have knowledge about most penetration testing fields. You will also learn how to discover and exploit a number of dangerous vulnerabilities such as SQL injections, XSS vulnerabilities, and so on. At the end of each section you will learn how to detect, prevent and secure your system and yourself from these attacks. All the attacks in this course are practical attacks that work against any computer device, so it does not matter if the device is a phone, tablet, laptop, or whatever. Each attack is explained in a simple way: first you will learn the theory behind each attack and then you will learn how to carry out the attack using Kali Linux."--Resource description page 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Kali Linux. 
630 0 7 |a Kali Linux.  |2 fast  |0 (OCoLC)fst01914587 
650 0 |a Hacking. 
650 0 |a Penetration testing (Computer security) 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 6 |a Piratage informatique. 
650 6 |a Tests d'intrusion. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Hacking.  |2 fast  |0 (OCoLC)fst01909643 
650 7 |a Penetration testing (Computer security)  |2 fast  |0 (OCoLC)fst01789566 
655 4 |a Electronic videos. 
856 4 0 |u https://learning.oreilly.com/videos/~/9781789340297/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP