The Ultimate Kali Linux Book: Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire

· Packt Publishing via PublishDrive · Αφήγηση από Alex Freeman AI
5,0
1 κριτική
Ηχητικό βιβλίο
13 ώ. 47 λ.
Πλήρης
Κατάλληλο
Θέλετε ένα δωρεάν δείγμα 1 ώ. 27 λ.; Μπορείτε να το ακούσετε οποιαδήποτε στιγμή, ακόμα και εκτός σύνδεσης. 
Προσθήκη

Σχετικά με το ηχητικό βιβλίο

Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks.
This audiobook is a comprehensive guide for those who are new to Kali Linux and penetration testing that will have you up to speed in no time. Using real-world scenarios, you’ll understand how to set up a lab and explore core penetration testing concepts. Throughout this book, you’ll focus on information gathering and even discover different vulnerability assessment tools bundled in Kali Linux. You’ll learn to discover target systems on a network, identify security flaws on devices, exploit security weaknesses and gain access to networks, set up Command and Control (C2) operations, and perform web application penetration testing. In this updated second edition, you’ll be able to compromise Active Directory and exploit enterprise networks. Finally, this audiobook covers best practices for performing complex web penetration testing techniques in a highly secured environment.
By the end of this Kali Linux audiobook, you’ll have gained the skills to perform advanced penetration testing on enterprise networks using Kali Linux.

Βαθμολογίες και αξιολογήσεις

5,0
1 αξιολόγηση

Σχετικά με τον συγγραφέα

Glen D. Singh is an information security author and cybersecurity instructor. His areas of expertise are cybersecurity operations, offensive security tactics, and enterprise networking. He is a holder of many certifications, including CEH, CHFI, PAWSP, and 3xCCNA (in CyberOps, Security, and Routing and Switching).Glen loves teaching and mentoring others and sharing his wealth of knowledge and experience as an author. He has written many books that focus on vulnerability discovery and exploitation, threat detection, intrusion analysis, incident response, network security, and enterprise networking. As an aspiring game-changer, Glen is passionate about increasing cybersecurity awareness in his homeland, Trinidad and Tobago.

Αξιολογήστε αυτό το ηχητικό βιβλίο

Πείτε μας τη γνώμη σας.

Ακρόαση πληροφοριών

Smartphone και tablet
Εγκαταστήστε την εφαρμογή Βιβλία Google Play για Android και iPad/iPhone. Συγχρονίζεται αυτόματα με τον λογαριασμό σας και σας επιτρέπει να διαβάζετε στο διαδίκτυο ή εκτός σύνδεσης, όπου κι αν βρίσκεστε.
Φορητοί και επιτραπέζιοι υπολογιστές
Μπορείτε να διαβάσετε βιβλία που έχετε αγοράσει από το Google Play χρησιμοποιώντας το πρόγραμμα περιήγησης του υπολογιστή σας.