Cargando…

Pentesting fundamentals for beginners.

Learn the fundamentals of cybersecurity using hands-on applied learning materials About This Video Learn the fundamentals of ethical hacking from scratch with the help of practical examples The course comes bundled with all the requisite materials to reinforce learning Identify the appropriate pente...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : Packt Publishing, [2022]
Edición:[First edition].
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007i 4500
001 OR_on1334594344
003 OCoLC
005 20231017213018.0
006 m o c
007 vz czazuu
007 cr cnannnuuuuu
008 220706s2022 xx 451 o vleng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d OCLCF  |d OCLCO 
020 |a 9781804615553  |q (electronic video) 
020 |a 1804615552  |q (electronic video) 
029 1 |a AU@  |b 000072186157 
035 |a (OCoLC)1334594344 
037 |a 9781804615553  |b O'Reilly Media 
050 4 |a TK5105.59 
082 0 4 |a 005.8/3  |2 23/eng/20220706 
049 |a UAMI 
245 0 0 |a Pentesting fundamentals for beginners. 
250 |a [First edition]. 
264 1 |a [Place of publication not identified] :  |b Packt Publishing,  |c [2022] 
300 |a 1 online resource (1 video file (7 hr., 31 min.)) :  |b sound, color. 
306 |a 073100 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
344 |a digital  |2 rdatr 
347 |a video file  |2 rdaft 
380 |a Instructional films  |2 lcgft 
511 0 |a Cliff Krahenbill, presenter. 
500 |a "Updated in June 2022." 
520 |a Learn the fundamentals of cybersecurity using hands-on applied learning materials About This Video Learn the fundamentals of ethical hacking from scratch with the help of practical examples The course comes bundled with all the requisite materials to reinforce learning Identify the appropriate pentesting framework for meeting the needs of a specific client In Detail Ethical hacking fundamentals do not change from one exam to the next. One can expect to see questions about Nmap, what commands were used to generate a specific output, and which tool would you use, regardless of the exam vendor. An individual is expected to know what pentesting framework would be used to meet a specific condition and what information should be delivered in an executive summary. You should know how to scope an assessment and identify what document is used for what purpose and the OWASP Top 10 and identify the hacking methodology used to exploit each one. These are just a few fundamentals that remain constant from one ethical hacking exam. This course provides you with the fundamental knowledge every ethical hacker is expected to know. Throughout this course, you will learn about cybersecurity tools, reverse shells, scripting basics, identifying output, and what commands were used to generate the output. This course will help you identify security tools and ethical hacking techniques, exploit web application vulnerabilities, appropriate documentation for starting and finalizing a pentest, correct reporting procedures, and appropriately exploit for a given vulnerability. By the end of this course, you will have learned the fundamentals of pentesting, and renewed your confidence, and recharged your cyber security career with ease. Audience This course is for the individuals wanting to begin work as an ethical hacker or pentester, and who want to become a Pentest+, Cybersecurity Analyst (CySA+), OSCP, or CeH certified. Anyone who requires a refresher on ethical hacking fundamentals, preparing for entry-level to mid-level cybersecurity exams, and is interested in learning the fundamentals of cybersecurity will gain a lot from this course. You will need a PC or laptop, a stable internet connection, hardware capable of virtualization, and a strong willingness to learn!. 
588 0 |a Online resource; title from title details screen (O'Reilly, viewed July 6, 2022). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security  |x Examinations  |v Study guides. 
650 0 |a Penetration testing (Computer security)  |x Certification  |v Study guides. 
650 0 |a Computer networks  |x Security measures  |x Examinations  |v Study guides. 
650 0 |a Electronic data processing personnel  |x Examinations  |v Study guides. 
650 6 |a Sécurité informatique  |x Examens  |v Guides de l'étudiant. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |x Examens  |v Guides de l'étudiant. 
650 6 |a Informatique  |x Personnel  |x Examens  |v Guides de l'étudiant. 
650 7 |a Computer networks  |x Security measures  |x Examinations  |2 fast 
650 7 |a Computer security  |x Examinations  |2 fast 
655 7 |a Instructional films  |2 fast 
655 7 |a Internet videos  |2 fast 
655 7 |a Nonfiction films  |2 fast 
655 7 |a Study guides  |2 fast 
655 7 |a Instructional films.  |2 lcgft 
655 7 |a Nonfiction films.  |2 lcgft 
655 7 |a Internet videos.  |2 lcgft 
655 7 |a Films de formation.  |2 rvmgf 
655 7 |a Films autres que de fiction.  |2 rvmgf 
655 7 |a Vidéos sur Internet.  |2 rvmgf 
700 1 |a Krahenbill, Cliff,  |e presenter. 
710 2 |a Packt Publishing,  |e publisher. 
856 4 0 |u https://learning.oreilly.com/videos/~/9781804615553/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP