Ethical Hacker's Certification Guide (CEHv11): A comprehensive guide on Penetration Testing including Network Hacking, Social Engineering, and Vulnerability Assessment (English Edition)
Ethical Hacker's Certification Guide (CEHv11): A comprehensive guide on Penetration Testing including Network Hacking, Social Engineering, and Vulnerability Assessment (English Edition)
Dati e Statistiche
Salvato in 1 lista dei desideri
Ethical Hacker's Certification Guide (CEHv11): A comprehensive guide on Penetration Testing including Network Hacking, Social Engineering, and Vulnerability Assessment (English Edition)
Scaricabile subito
8,99 €
8,99 €
Scaricabile subito

Descrizione


Dive into the world of securing digital networks, cloud, IoT, mobile infrastructure, and much more. KEY FEATURES ? Courseware and practice papers with solutions for C.E.H. v11. ? Includes hacking tools, social engineering techniques, and live exercises. ? Add on coverage on Web apps, IoT, cloud, and mobile Penetration testing. DESCRIPTION The 'Certified Ethical Hacker's Guide' summarises all the ethical hacking and penetration testing fundamentals you'll need to get started professionally in the digital security landscape. The readers will be able to approach the objectives globally, and the knowledge will enable them to analyze and structure the hacks and their findings in a better way. The book begins by making you ready for the journey of a seasonal, ethical hacker. You will get introduced to very specific topics such as reconnaissance, social engineering, network intrusion, mobile and cloud hacking, and so on. Throughout the book, you will find many practical scenarios and get hands-on experience using tools such as Nmap, BurpSuite, OWASP ZAP, etc. Methodologies like brute-forcing, wardriving, evil twining, etc. are explored in detail. You will also gain a stronghold on theoretical concepts such as hashing, network protocols, architecture, and data encryption in real-world environments. In the end, the evergreen bug bounty programs and traditional career paths for safety professionals will be discussed. The reader will also have practical tasks and self-assessment exercises to plan further paths of learning and certification. WHAT YOU WILL LEARN ? Learn methodologies, tools, and techniques of penetration testing and ethical hacking. ? Expert-led practical demonstration of tools and tricks like nmap, BurpSuite, and OWASP ZAP. ? Learn how to perform brute forcing, wardriving, and evil twinning. ? Learn to gain and maintain access to remote systems. ? Prepare detailed tests and execution plans for VAPT (vulnerability assessment and penetration testing) scenarios. WHO THIS BOOK IS FOR This book is intended for prospective and seasonal cybersecurity lovers who want to master cybersecurity and ethical hacking. It also assists software engineers, quality analysts, and penetration testing companies who want to keep up with changing cyber risks. AUTHOR BIO Sohaib is a digital security enthusiast and a Certified Ethical Hacker. He has been associated with the cybersecurity industry in various capabilities ranging from taking seminars and workshops to bug bountie. He is involved in educating people from different walks of life about the nature of the digital world and how to keep themselves safe. He is also the co-author of an award winning paper titled "Sustainable Security of Information Systems" presented at Emerging Trends in Information/Network Security conference (ETINS) along with papers on Game Theory. He also collaborates frequently with educational institutions to develop curriculum and practical labs for their ethical hacking and security programs. With a decade of experience in software development and design, he is currently into building highly scalable and secure solutions for the modern digital world.

Dettagli

Tutti i dispositivi (eccetto Kindle) Scopri di più
Reflowable
9789391392161

Compatibilità

Formato:

Gli eBook venduti da Feltrinelli.it sono in formato ePub e possono essere protetti da Adobe DRM. In caso di download di un file protetto da DRM si otterrà un file in formato .acs, (Adobe Content Server Message), che dovrà essere aperto tramite Adobe Digital Editions e autorizzato tramite un account Adobe, prima di poter essere letto su pc o trasferito su dispositivi compatibili.

Compatibilità:

Gli eBook venduti da Feltrinelli.it possono essere letti utilizzando uno qualsiasi dei seguenti dispositivi: PC, eReader, Smartphone, Tablet o con una app Kobo iOS o Android.

Cloud:

Gli eBook venduti da Feltrinelli.it sono sincronizzati automaticamente su tutti i client di lettura Kobo successivamente all’acquisto. Grazie al Cloud Kobo i progressi di lettura, le note, le evidenziazioni vengono salvati e sincronizzati automaticamente su tutti i dispositivi e le APP di lettura Kobo utilizzati per la lettura.

Clicca qui per sapere come scaricare gli ebook utilizzando un pc con sistema operativo Windows