|
|
|
|
LEADER |
00000cgm a22000007i 4500 |
001 |
OR_on1357152632 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
vz czazuu |
007 |
cr cnannnuuuuu |
008 |
230110s2022 xx 503 o vleng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d ORMDA
|d OCLCF
|
020 |
|
|
|a 9781837636181
|q (electronic video)
|
020 |
|
|
|a 1837636184
|q (electronic video)
|
029 |
1 |
|
|a AU@
|b 000073289737
|
035 |
|
|
|a (OCoLC)1357152632
|
037 |
|
|
|a 9781837636181
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23/eng/20230110
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Practical cyber hacking skills for beginners.
|
250 |
|
|
|a [First edition].
|
264 |
|
1 |
|a [Place of publication not identified] :
|b Packt Publishing,
|c [2022]
|
300 |
|
|
|a 1 online resource (1 video file (8 hr., 23 min.)) :
|b sound, color.
|
306 |
|
|
|a 082300
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
344 |
|
|
|a digital
|2 rdatr
|
347 |
|
|
|a video file
|2 rdaft
|
380 |
|
|
|a Instructional films
|2 lcgft
|
511 |
0 |
|
|a Alexander Oni, presenter.
|
520 |
|
|
|a Cybersecurity is the protection of computers and networks from information disclosure, theft, or damage to hardware and software, and the disruption or misdirection of the services provided. It is a practice of protecting systems, networks, and programs from digital attacks. The course begins with an overview of the core key principles of cybersecurity, including access control and the CIA triad. Learn about virtualization and installing the Kali Linux operating system on your computer using a virtual box. Next, we will understand how phishing is used by hackers to collect private information by cloning a website ourselves using the blackeye tool. You will further learn about the key networking principles, including DNS, DHCP, NAT, ports, and protocols, and use the most potent network scanning tool--NMAP. Next, learn about hashing using PowerShell and hashcat and how to perform brute force attacks. Delve deep into all about websites, web applications, and databases. Explore the OWASP top 10 and use Burp Suite to scan, crawl, and audit websites. Understand social engineering and learn to use Maltego to gather information about a person or company. Finally, understand data management, incident response, and disaster recovery plans. Upon completion, you will have gathered comprehensive knowledge about cybersecurity to consider building a lucrative career in this field. What You Will Learn Learn to work with the Kali Linux operating system Learn to use the NMAP network scanner Understand how to create a cloned LinkedIn website Explore hacking and hacking methodologies Develop a strong foundation in networking principles and technologies Learn how to calculate hash values with PowerShell Audience This course is designed for non-professionals and students with a fundamental knowledge of cyber security. Individuals who want to learn practical techniques to protect privacy online and acquire a deeper understanding of cyber security. This course is not for absolute beginners. You do not need a background in cyber security, though any prior knowledge would be beneficial. About The Author Alexander Oni: Alexander Oni is a bestselling instructor with 70,000 students enrolled in his courses. His passion includes teaching through online courses in an entertaining way. Alex has been teaching online for three years and has created over 25 courses with numerous students registered worldwide. Alex believes we all have one shot at life and should live life to the fullest, constantly stepping out of our comfort zone, visiting places, and trying new things. His success in Udemy has given him financial freedom and the ability to travel and settle anywhere. The author is currently avidly traveling, spending a month in every city and moving to the next. His hobbies include watching movies, sports, and chess.
|
588 |
|
|
|a Online resource; title from title details screen (O'Reilly, viewed January 10, 2023).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Hackers.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Hackers.
|2 fast
|0 (OCoLC)fst00872150
|
655 |
|
7 |
|a Instructional films.
|2 fast
|0 (OCoLC)fst01726236
|
655 |
|
7 |
|a Internet videos.
|2 fast
|0 (OCoLC)fst01750214
|
655 |
|
7 |
|a Nonfiction films.
|2 fast
|0 (OCoLC)fst01710269
|
655 |
|
7 |
|a Instructional films.
|2 lcgft
|
655 |
|
7 |
|a Nonfiction films.
|2 lcgft
|
655 |
|
7 |
|a Internet videos.
|2 lcgft
|
700 |
1 |
|
|a Oni, Alexander,
|e presenter.
|
710 |
2 |
|
|a Packt Publishing,
|e publisher.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781837636181/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|