|
|
|
|
LEADER |
00000cgm a22000007a 4500 |
001 |
OR_on1240166187 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
cr cn||||||||| |
007 |
vz czazuu |
008 |
210301s2021 xx --- o vleng d |
040 |
|
|
|a TOH
|b eng
|c TOH
|d OCLCO
|d NZCPL
|d OCLCF
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1260703538
|a 1305885018
|
020 |
|
|
|a 9781801074421
|
020 |
|
|
|a 1801074429
|
024 |
8 |
|
|a 9781801074421
|
029 |
1 |
|
|a AU@
|b 000068857992
|
035 |
|
|
|a (OCoLC)1240166187
|z (OCoLC)1260703538
|z (OCoLC)1305885018
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Academy, HackerSploit,
|e author.
|
245 |
1 |
0 |
|a Nmap for Penetration Testing :
|b From Beginner to Advanced [Updated for 2021] /
|c Academy, HackerSploit.
|
250 |
|
|
|a 1st edition.
|
264 |
|
1 |
|b Packt Publishing,
|c 2021.
|
300 |
|
|
|a 1 online resource (1 video file, approximately 6 hr., 32 min.)
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a video file
|
365 |
|
|
|b 134.99
|
520 |
|
|
|a A carefully tailored and structured course to make you an expert in Nmap in just 6.5 hours About This Video Gain a solid understanding of Nmap Learn modern techniques to map and scan the network Learn how to generate outputs and reports with WebMap In Detail Network scanning and enumeration have become an increasingly important aspect of penetration tests over the last couple of years. Organizations now have a complex network of assets storing sensitive and valuable data. To test the security posture of the organization, conducting effective network scanning and enumeration of the organization's network is mandatory. This course will help you become an expert in Nmap quickly and easily. The course starts by showing you the steps for setting up the working and then highlights the importance of Nmap for network scanning. Next, you will grasp the fundamental concepts of networking, such as port scanning, the Open Systems Interconnection (OSI) model, network layer, and transport layer. Moving along, you will learn how to discover hosts using pings and understand advanced scanning topics that will help you to set up your own virtual hacking lab. Next, you will learn techniques to detect and evade firewalls and become familiar with the Nmap Scripting Engine (NSE). Finally, you will find out the role of enumeration services, such as File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Doman Name System (DNS), HyperText Transfer Protocol (HTTP), Server Message Block (SMB), and MySQL in network scanning. By the end of this course, you will have all the key skills needed to use Nmap for penetration testing.
|
542 |
|
|
|f Packt Publishing
|g 2021
|
550 |
|
|
|a Made available through: Safari, an O'Reilly Media Company.
|
588 |
0 |
|
|a Online resource; Title from title screen (viewed January 19, 2021).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
710 |
2 |
|
|a O'Reilly for Higher Education (Firm),
|e distributor.
|
710 |
2 |
|
|a Safari, an O'Reilly Media Company.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781801074421/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
936 |
|
|
|a BATCHLOAD
|
994 |
|
|
|a 92
|b IZTAP
|