Cargando…

An Introduction to Ethical Hacking with Kali Linux /

Expose vulnerabilities of servers and applications and help developers create robust systems About This Video Learn the use of popular tools in ethical hacking Expose vulnerabilities in systems Identify and record security flaws and breaches In Detail Learn ethical hacking through Kali Linux, one of...

Descripción completa

Detalles Bibliográficos
Autor principal: Cosentino, Scott (Autor)
Autor Corporativo: Safari, an O'Reilly Media Company
Formato: Electrónico Video
Idioma:Inglés
Publicado: Packt Publishing, 2021.
Edición:1st edition.
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007a 4500
001 OR_on1249102294
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cn|||||||||
007 vz czazuu
008 210501s2021 xx --- o vleng d
040 |a TOH  |b eng  |c TOH  |d OCLCO  |d NZCPL  |d OCLCF  |d OCLCO  |d OCLCQ 
019 |a 1260704505  |a 1305902739 
020 |a 9781801075527 
020 |a 1801075522 
024 8 |a 9781801075527 
029 1 |a AU@  |b 000068941713 
035 |a (OCoLC)1249102294  |z (OCoLC)1260704505  |z (OCoLC)1305902739 
049 |a UAMI 
100 1 |a Cosentino, Scott,  |e author. 
245 1 3 |a An Introduction to Ethical Hacking with Kali Linux /  |c Cosentino, Scott. 
250 |a 1st edition. 
264 1 |b Packt Publishing,  |c 2021. 
300 |a 1 online resource (1 video file, approximately 3 hr., 19 min.) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a video file 
365 |b 49.99 
520 |a Expose vulnerabilities of servers and applications and help developers create robust systems About This Video Learn the use of popular tools in ethical hacking Expose vulnerabilities in systems Identify and record security flaws and breaches In Detail Learn ethical hacking through Kali Linux, one of the leading computer security operating systems. In this course, you will learn how to gather information, detect vulnerabilities, and exploit them using tools in Kali Linux. This course will give you all of the tools that you need to be able to test your own servers and applications for vulnerabilities. Computer security is one of the fastest-growing fields in technology, and ethical hacking is one of the best skills to learn in the field. With a new attack being completed every 39 seconds, it is essential that security experts are equipped with the most powerful tools for the job. The tools in Kali Linux are commonly used by attackers and defenders to help secure their systems. Learning these tools will allow you to secure your system before the attackers get to it. You will learn how to exploit common vulnerabilities in Linux and Windows, as well as how to find common vulnerabilities in web apps such as command injections and SQL injections. 
542 |f Packt Publishing  |g 2021 
550 |a Made available through: Safari, an O'Reilly Media Company. 
588 0 |a Online resource; Title from title screen (viewed March 26, 2021). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
710 2 |a O'Reilly for Higher Education (Firm),  |e distributor. 
710 2 |a Safari, an O'Reilly Media Company. 
856 4 0 |u https://learning.oreilly.com/videos/~/9781801075527/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a BATCHLOAD 
994 |a 92  |b IZTAP