Cargando…

Hands-On Network Scanning with Nmap for Network Security

Audit and analyze your network security with Nmap About This Video Understand the power of Nmap to discover vulnerabilities, emulate intruder attacks, and secure internal resources Your preparation guide to performing internal network security audits Utilize Zenmap to perform Nmap scanning and use t...

Descripción completa

Detalles Bibliográficos
Autor principal: Rogalski, Brian (Autor)
Autor Corporativo: Safari, an O'Reilly Media Company
Formato: Electrónico Video
Idioma:Inglés
Publicado: Packt Publishing, 2020.
Edición:1st edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007a 4500
001 OR_on1152555728
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cnu||||||||
007 vz czazuu
008 030420s2020 xx --- vleng
040 |a AU@  |b eng  |c AU@  |d NZCPL  |d OCLCF  |d OCLCO  |d OCLCQ  |d DST 
019 |a 1232117795  |a 1300574318  |a 1303317906 
020 |z 9781838981853 
024 8 |a 9781838981853 
029 0 |a AU@  |b 000067075712 
035 |a (OCoLC)1152555728  |z (OCoLC)1232117795  |z (OCoLC)1300574318  |z (OCoLC)1303317906 
049 |a UAMI 
100 1 |a Rogalski, Brian,  |e author. 
245 1 0 |a Hands-On Network Scanning with Nmap for Network Security  |h [electronic resource] /  |c Rogalski, Brian. 
250 |a 1st edition. 
264 1 |b Packt Publishing,  |c 2020. 
300 |a 1 online resource (1 video file, approximately 2 hr., 59 min.) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a video file 
520 |a Audit and analyze your network security with Nmap About This Video Understand the power of Nmap to discover vulnerabilities, emulate intruder attacks, and secure internal resources Your preparation guide to performing internal network security audits Utilize Zenmap to perform Nmap scanning and use the Nmap scripting engine to automate tasks In Detail Do you want to enhance your organization's network security? Are you worried about what could happen if an intruder were to move laterally throughout your network? Internal network security testing is a critical aspect of any security program, while not knowing if an attacker has successfully identified a flaw that has led to a breach could be disastrous. In this course, you will learn about several modules to use Nmap in real life situations, discovering vulnerabilities, and emulate an attack on a system. You will start with a review of penetration testing processes, installing Nmap, types of available scans, and the reasons for selecting different Nmap scanning options. Next, you will learn about advanced scanning with Nmap and customize scans to analyze machines, servers, and networking devices. You will then create Nmap reports and customize formatting options for detailed information about the network. You will automate useful activities using the Nmap scripting engine. You will also learn about Firewall and IDS evasion and Zenmap GUI. By the end of this course, you will be able to confidently audit your network with Nmap and scan through vulnerabilities to secure your network. 
538 |a Mode of access: World Wide Web. 
542 |f Packt Publishing  |g 2020 
550 |a Made available through: Safari, an O'Reilly Media Company. 
588 |a Online resource; Title from title screen (viewed March 26, 2020) 
533 |a Electronic reproduction.  |b Boston, MA :  |c Safari.  |n Available via World Wide Web.,  |d 2020. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
655 4 |a Electronic videos. 
710 2 |a Safari, an O'Reilly Media Company. 
776 |z 1-83898-185-3 
856 4 0 |u https://learning.oreilly.com/videos/~/9781838981853/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a BATCHLOAD 
994 |a 92  |b IZTAP