Cargando…

Getting Started in Port Scanning Using Nmap and Kali Linux /

Discover top-class methods to identify weaknesses in services and systems to mitigate against network attacks About This Video Learn how to tackle common network security threats with Kali Linux and Nmap Understand different port selection mechanisms of Nmap Understand Ansible configuration manageme...

Descripción completa

Detalles Bibliográficos
Autor principal: Mallett, Andrew (Autor)
Autor Corporativo: Safari, an O'Reilly Media Company
Formato: Electrónico Video
Idioma:Inglés
Publicado: Packt Publishing, 2020.
Edición:1st edition.
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007a 4500
001 OR_on1235778330
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cn|||||||||
007 vz czazuu
008 011220s2020 xx --- o vleng d
040 |a TOH  |b eng  |c TOH  |d OCLCO  |d NZCPL  |d OCLCF  |d OCLCO  |d OCLCQ 
019 |a 1232116567  |a 1305904948 
020 |a 9781801078696 
020 |a 1801078696 
024 8 |a 9781801078696 
029 1 |a AU@  |b 000068857836 
035 |a (OCoLC)1235778330  |z (OCoLC)1232116567  |z (OCoLC)1305904948 
049 |a UAMI 
100 1 |a Mallett, Andrew,  |e author. 
245 1 0 |a Getting Started in Port Scanning Using Nmap and Kali Linux /  |c Mallett, Andrew. 
250 |a 1st edition. 
264 1 |b Packt Publishing,  |c 2020. 
300 |a 1 online resource (1 video file, approximately 2 hr., 19 min.) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a video file 
365 |b 19.99 
520 |a Discover top-class methods to identify weaknesses in services and systems to mitigate against network attacks About This Video Learn how to tackle common network security threats with Kali Linux and Nmap Understand different port selection mechanisms of Nmap Understand Ansible configuration management and implement it in a real-world scenario Kali Linux is one of the popular tools used for penetration testing, ethical hacking, and network security assessments. This course will help you to explore the techniques of port scanning using Nmap and Kali Linux. The course starts by introducing you to the course objectives and to Kali Linux and Nmap. Next, you will delve into the concepts of host discovery, creating Nmap host lists in Kali Linux on the way. Moving ahead, you will learn the techniques used to perform scans with Nmap and learn the process of auditing Secure Shell (SSH) security to detect systems that allow password-based authentication. Toward the end, you will learn to use Ansible to secure the threats, ensuring that the fixes are documented are repeatable. Throughout this course, you will use Wireshark to analyze the network activity, which will help you to understand the different nodes of Nmap with ease. By the end of this course, you will have gained all the essential skills needed to perform cybersecurity audits of your network using Kali Linux and Nmap. 
542 |f Packt Publishing  |g 2020 
550 |a Made available through: Safari, an O'Reilly Media Company. 
588 0 |a Online resource; Title from title screen (viewed November 26, 2020). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
710 2 |a O'Reilly for Higher Education (Firm),  |e distributor. 
710 2 |a Safari, an O'Reilly Media Company. 
856 4 0 |u https://learning.oreilly.com/videos/~/9781801078696/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a BATCHLOAD 
994 |a 92  |b IZTAP