Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Advanced penetration testing with Kali Linux = unlocking industry-oriented VAPT tactics /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Advanced penetration testing with Kali Linux / Ummed Meel.
Reminder of title:
unlocking industry-oriented VAPT tactics /
Author:
Meel, Ummed.
Description:
1 online resource (386 pages)
Subject:
COMPUTERS / Security / Cryptography & Encryption. -
Online resource:
https://portal.igpublish.com/iglibrary/search/BPB0000503.html
ISBN:
9789355519511
Advanced penetration testing with Kali Linux = unlocking industry-oriented VAPT tactics /
Meel, Ummed.
Advanced penetration testing with Kali Linux
unlocking industry-oriented VAPT tactics /[electronic resource] :Ummed Meel. - 1 online resource (386 pages)
Includes bibliographical references and index.
Advanced penetration testing with Kali Linux : unlocking industry-oriented VAPT tactics -- Dedicated -- About the Author -- About the Reviewer -- Acknowledgement -- Preface -- Coloured Images -- Table of Contents -- Chapter 1: Beginning with Advanced Pen Testing -- Chapter 2: Setting up the VAPT Lab -- Chapter 3: Active and Passive Reconnaissance Tactics -- Chapter 4: Vulnerability Assessment and Management -- Chapter 5: Exploiting Computer Network -- Chapter 6: Exploiting Web Application -- Chapter 7: Exploiting Wireless Network -- Chapter 8: Hash Cracking and Post Exploitation -- Chapter 9: Bypass Security Controls -- Chapter 10: Revolutionary Approaches to Report Writing -- Index.
Access restricted to authorized users and institutions.
This book is a comprehensive guide to Vulnerability Assessment and Penetration Testing (VAPT), designed to teach and empower readers of all cybersecurity backgrounds. Whether you are a beginner or an experienced IT professional, this book will give you the knowledge and practical skills you need to navigate the ever-changing cybersecurity landscape effectively. With a focused yet comprehensive scope, this book covers all aspects of VAPT, from the basics to the advanced techniques. It also discusses project planning, governance, and the critical PPT (People, Process, and Technology) framework, providing a holistic understanding of this essential practice. Additionally, the book emphasizes on the pre-engagement strategies and the importance of choosing the right security assessments. The book's hands-on approach teaches you how to set up a VAPT test lab and master key techniques such as reconnaissance, vulnerability assessment, network pentesting, web application exploitation, wireless network testing, privilege escalation, and bypassing security controls. This will help you to improve your cybersecurity skills and become better at protecting digital assets. Lastly, the book aims to ignite your curiosity, foster practical abilities, and prepare you to safeguard digital assets effectively, bridging the gap between theory and practice in the field of cybersecurity.
Mode of access: World Wide Web.
ISBN: 9789355519511Subjects--Topical Terms:
1483837
COMPUTERS / Security / Cryptography & Encryption.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: QA76.9
Dewey Class. No.: 004.6
Advanced penetration testing with Kali Linux = unlocking industry-oriented VAPT tactics /
LDR
:03080nam a2200289 i 4500
001
1157314
006
m eo d
007
cr cn |||m|||a
008
250717s2023 ob 000 0 eng d
020
$a
9789355519511
020
$a
9789355519887
035
$a
BPB0000503
041
0
$a
eng
050
0 0
$a
QA76.9
082
0 0
$a
004.6
100
1
$a
Meel, Ummed.
$3
1483912
245
1 0
$a
Advanced penetration testing with Kali Linux
$h
[electronic resource] :
$b
unlocking industry-oriented VAPT tactics /
$c
Ummed Meel.
264
1
$a
[Place of publication not identified] :
$b
BPB Publications,
$c
2023.
264
4
$c
©2024
300
$a
1 online resource (386 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0
$a
Advanced penetration testing with Kali Linux : unlocking industry-oriented VAPT tactics -- Dedicated -- About the Author -- About the Reviewer -- Acknowledgement -- Preface -- Coloured Images -- Table of Contents -- Chapter 1: Beginning with Advanced Pen Testing -- Chapter 2: Setting up the VAPT Lab -- Chapter 3: Active and Passive Reconnaissance Tactics -- Chapter 4: Vulnerability Assessment and Management -- Chapter 5: Exploiting Computer Network -- Chapter 6: Exploiting Web Application -- Chapter 7: Exploiting Wireless Network -- Chapter 8: Hash Cracking and Post Exploitation -- Chapter 9: Bypass Security Controls -- Chapter 10: Revolutionary Approaches to Report Writing -- Index.
506
$a
Access restricted to authorized users and institutions.
520
3
$a
This book is a comprehensive guide to Vulnerability Assessment and Penetration Testing (VAPT), designed to teach and empower readers of all cybersecurity backgrounds. Whether you are a beginner or an experienced IT professional, this book will give you the knowledge and practical skills you need to navigate the ever-changing cybersecurity landscape effectively. With a focused yet comprehensive scope, this book covers all aspects of VAPT, from the basics to the advanced techniques. It also discusses project planning, governance, and the critical PPT (People, Process, and Technology) framework, providing a holistic understanding of this essential practice. Additionally, the book emphasizes on the pre-engagement strategies and the importance of choosing the right security assessments. The book's hands-on approach teaches you how to set up a VAPT test lab and master key techniques such as reconnaissance, vulnerability assessment, network pentesting, web application exploitation, wireless network testing, privilege escalation, and bypassing security controls. This will help you to improve your cybersecurity skills and become better at protecting digital assets. Lastly, the book aims to ignite your curiosity, foster practical abilities, and prepare you to safeguard digital assets effectively, bridging the gap between theory and practice in the field of cybersecurity.
538
$a
Mode of access: World Wide Web.
650
7
$a
COMPUTERS / Security / Cryptography & Encryption.
$2
bisacsh
$3
1483837
650
7
$a
COMPUTERS / Security / Network Security.
$2
bisacsh
$3
1483836
650
7
$a
COMPUTERS / Networking / Network Protocols.
$2
bisacsh
$3
1483839
650
7
$a
COMPUTERS / Computer Science.
$2
bisacsh
$3
1483847
655
4
$a
Electronic books.
$2
local
$3
554714
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/BPB0000503.html
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login