Cargando…

Enterprise penetration testing and continuous monitoring (The art of hacking series) : LiveLessons /

"Enterprise Penetration Testing and Continuous Monitoring LiveLessons, part of The Art of Hacking video series, provides step-by-step, real-life complex scenarios of performing security assessments (penetration testing) of enterprise networks using internal/external reconnaissance, social engin...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : Cisco Press : Pearson, 2019.
Colección:LiveLessons (Indianapolis, Ind.)
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a2200000 i 4500
001 OR_on1112253839
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cna||||||||
007 vz czazuu
008 190815t20192018xx 216 o vleng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d UMI  |d OCLCF  |d OCLCQ  |d OCLCO 
029 1 |a AU@  |b 000071520202 
035 |a (OCoLC)1112253839 
037 |a CL0501000065  |b Safari Books Online 
050 4 |a QA76.9.A25 
049 |a UAMI 
100 1 |a Santos, Omar,  |e on-screen presenter. 
245 1 0 |a Enterprise penetration testing and continuous monitoring (The art of hacking series) :  |b LiveLessons /  |c Omar Santos. 
264 1 |a [Place of publication not identified] :  |b Cisco Press :  |b Pearson,  |c 2019. 
264 4 |c ©2018 
300 |a 1 online resource (1 streaming video file (3 hr., 35 min., 48 sec.)) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
337 |a video  |b v  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a LiveLessons 
511 0 |a Presenter, Omar Santos. 
500 |a Title from resource description page (Safari, viewed August 13, 2019). 
520 |a "Enterprise Penetration Testing and Continuous Monitoring LiveLessons, part of The Art of Hacking video series, provides step-by-step, real-life complex scenarios of performing security assessments (penetration testing) of enterprise networks using internal/external reconnaissance, social engineering, and network and vulnerability scanning. You also learn how to perform web app testing, internal network testing, privilege escalation, password cracking, and data exfiltration to probe for and mitigate enterprise vulnerabilities. The course concludes with a look at reporting and evaluation methods to ensure that your enterprise environment stays secure from ever-evolving threats and security vulnerabilities."--Resource description page 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Penetration testing (Computer security) 
650 0 |a Computer security. 
650 0 |a Hacking. 
650 0 |a Computer networks  |x Security measures. 
650 2 |a Computer Security 
650 6 |a Tests d'intrusion. 
650 6 |a Sécurité informatique. 
650 6 |a Piratage informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Hacking.  |2 fast  |0 (OCoLC)fst01909643 
650 7 |a Penetration testing (Computer security)  |2 fast  |0 (OCoLC)fst01789566 
830 0 |a LiveLessons (Indianapolis, Ind.) 
856 4 0 |u https://learning.oreilly.com/videos/~/9780134854779/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP