Mastering Kali Linux for Advanced Penetration Testing - Fourth Edition: Apply a proactive approach to secure your cyber infrastructure and enhance you

Mastering Kali Linux for Advanced Penetration Testing - Fourth Edition: Apply a proactive approach to secure your cyber infrastructure and enhance you - Vijay Kumar Velu

Mastering Kali Linux for Advanced Penetration Testing - Fourth Edition: Apply a proactive approach to secure your cyber infrastructure and enhance you


Master key approaches used by real attackers to perform advanced pentesting in tightly secured infrastructure, cloud environments, and applications, and become familiar with the latest hacking techniques
Key Features: Master advanced pentesting tactics and techniques with Kali Linux to build highly secure systemsLeverage Kali Linux to penetrate modern infrastructures and avoid detectionExplore red teaming and play the hackers game to proactively defend your infrastructure
Book Description: Remote working has given hackers plenty of opportunities as more confidential information is shared over the internet than ever before. In this new edition of Mastering Kali Linux for Advanced Penetration Testing, you'll learn an offensive approach to enhance your penetration testing skills by becoming aware of the tactics employed by real attackers. You'll go through laboratory integration to cloud services so that you learn another dimension of exploitation that is typically forgotten during a penetration test. You'll explore different ways of installing and running Kali Linux in a VM and containerized environment and deploy vulnerable cloud services on AWS using containers. This book covers the principles of passive and active reconnaissance, from obtaining user information to large-scale port scanning. Building on this, different vulnerability assessments are explored, including threat modeling. You'll also learn about COVID-19 specific cyber failures and understand the cyber risks involved with working from home.By the end of this book, you'll have explored approaches for performing advanced pentesting in tightly secured infrastructure, cloud environments, and applications and hacking techniques employed on IoT, embedded peripheral devices, and radio frequencies.
What You Will Learn: Exploit networks using wired/wireless networks, cloud infrastructure, and web servicesLearn embedded peripheral device, radio frequency, and IoT hacking techniquesMaster the art of bypassing traditional antivirus and endpoint detection and response (EDR) toolsTest for data system exploits using Metasploit, PowerShell Empire, and CrackMapExecPerform cloud security vulnerability assessment and exploitation of security misconfigurationTake your physical security testing to the next level with RFID/Bluetooth hacking and learn how to clone identity cards
Who this book is for: This fourth edition is for security analysts, pentesters, ethical hackers, red team operators, and se
Citeste mai mult

-10%

transport gratuit

PRP: 510.37 Lei

!

Acesta este Pretul Recomandat de Producator. Pretul de vanzare al produsului este afisat mai jos.

459.33Lei

459.33Lei

510.37 Lei

Primesti 459 puncte

Important icon msg

Primesti puncte de fidelitate dupa fiecare comanda! 100 puncte de fidelitate reprezinta 1 leu. Foloseste-le la viitoarele achizitii!

Livrare in 2-4 saptamani

Descrierea produsului


Master key approaches used by real attackers to perform advanced pentesting in tightly secured infrastructure, cloud environments, and applications, and become familiar with the latest hacking techniques
Key Features: Master advanced pentesting tactics and techniques with Kali Linux to build highly secure systemsLeverage Kali Linux to penetrate modern infrastructures and avoid detectionExplore red teaming and play the hackers game to proactively defend your infrastructure
Book Description: Remote working has given hackers plenty of opportunities as more confidential information is shared over the internet than ever before. In this new edition of Mastering Kali Linux for Advanced Penetration Testing, you'll learn an offensive approach to enhance your penetration testing skills by becoming aware of the tactics employed by real attackers. You'll go through laboratory integration to cloud services so that you learn another dimension of exploitation that is typically forgotten during a penetration test. You'll explore different ways of installing and running Kali Linux in a VM and containerized environment and deploy vulnerable cloud services on AWS using containers. This book covers the principles of passive and active reconnaissance, from obtaining user information to large-scale port scanning. Building on this, different vulnerability assessments are explored, including threat modeling. You'll also learn about COVID-19 specific cyber failures and understand the cyber risks involved with working from home.By the end of this book, you'll have explored approaches for performing advanced pentesting in tightly secured infrastructure, cloud environments, and applications and hacking techniques employed on IoT, embedded peripheral devices, and radio frequencies.
What You Will Learn: Exploit networks using wired/wireless networks, cloud infrastructure, and web servicesLearn embedded peripheral device, radio frequency, and IoT hacking techniquesMaster the art of bypassing traditional antivirus and endpoint detection and response (EDR) toolsTest for data system exploits using Metasploit, PowerShell Empire, and CrackMapExecPerform cloud security vulnerability assessment and exploitation of security misconfigurationTake your physical security testing to the next level with RFID/Bluetooth hacking and learn how to clone identity cards
Who this book is for: This fourth edition is for security analysts, pentesters, ethical hackers, red team operators, and se
Citeste mai mult

De pe acelasi raft

Parerea ta e inspiratie pentru comunitatea Libris!

Noi suntem despre carti, si la fel este si

Newsletter-ul nostru.

Aboneaza-te la vestile literare si primesti un cupon de -10% pentru viitoarea ta comanda!

*Reducerea aplicata prin cupon nu se cumuleaza, ci se aplica reducerea cea mai mare.

Ma abonez image one
Ma abonez image one