Cargando…

Mastering Pentesting Using Kali Linux /

Do you want to become a pro with the tools that Kali Linux offers? Perform advanced penetration testing? Learn and practice ways to exploit the vulnerable systems and patch them! Get ready to make the best use of one of the most popular pen testing tools fancied by hackers around the globe. This cou...

Descripción completa

Detalles Bibliográficos
Autor principal: Gupta, Sunil (Autor, VerfasserIn.)
Autor Corporativo: Safari, an O'Reilly Media Company (Contribuidor, MitwirkendeR.)
Formato: Video
Idioma:Inglés
Publicado: [Erscheinungsort nicht ermittelbar] : EC-Council, 2020
Edición:1st edition.
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007i 4500
001 OR_on1268119541
003 OCoLC
005 20231017213018.0
006 m o c
007 cr uuu---uuuuu
007 vz czazuu
008 210914s2020 mau--- o vleng d
040 |a GBVCP  |b ger  |e rda  |c GBVCP  |d OCLCQ 
035 |a (OCoLC)1268119541 
049 |a UAMI 
100 1 |a Gupta, Sunil,  |e VerfasserIn.  |4 aut 
245 1 0 |a Mastering Pentesting Using Kali Linux /  |c Gupta, Sunil. 
250 |a 1st edition. 
264 1 |a [Erscheinungsort nicht ermittelbar] :  |b EC-Council,  |c 2020 
264 2 |a Boston, MA :  |b Safari 
300 |a 1 online resource (1 video file, circa 4 hr., 39 min.) 
336 |a zweidimensionales bewegtes Bild  |b tdi  |2 rdacontent/ger 
337 |a Computermedien  |b c  |2 rdamedia/ger 
338 |a Online-Ressource  |b cr  |2 rdacarrier/ger 
500 |a Online resource; Title from title screen (viewed August 31, 2020). 
520 |a Do you want to become a pro with the tools that Kali Linux offers? Perform advanced penetration testing? Learn and practice ways to exploit the vulnerable systems and patch them! Get ready to make the best use of one of the most popular pen testing tools fancied by hackers around the globe. This course will start from scratch and will provide you with essential knowledge of the most happening and widely used tools available in Kali Linux by performing real-world practicals. You will learn sniffing and spoofing attacks. You will also learn wireless hacking along with exploitation and post-exploitation techniques. This will train you to exploit various systems to carry out several powerful attacks and enable you to write reports post penetration testing. After completion of this course, you will be a pro in using major tools in Kali Linux and perform penetration testing. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
710 2 |a Safari, an O'Reilly Media Company.,  |e MitwirkendeR.  |4 ctb 
856 4 0 |u https://learning.oreilly.com/videos/~/430920ICRV/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a BATCHLOAD 
994 |a 92  |b IZTAP