語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Ethical hacker's certification guide (CEHv11) : = a comprehensive guide on penetration testing including network hacking, social engineering, and vulnerability assessment /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Ethical hacker's certification guide (CEHv11) :/ Mohd Sohaib.
其他題名:
a comprehensive guide on penetration testing including network hacking, social engineering, and vulnerability assessment /
作者:
Sohaib, Mohd.
面頁冊數:
1 online resource (432 pages)
標題:
COMPUTERS / Security / Cryptography & Encryption. -
電子資源:
https://portal.igpublish.com/iglibrary/search/BPB0000544.html
ISBN:
9789391392161
Ethical hacker's certification guide (CEHv11) : = a comprehensive guide on penetration testing including network hacking, social engineering, and vulnerability assessment /
Sohaib, Mohd.
Ethical hacker's certification guide (CEHv11) :
a comprehensive guide on penetration testing including network hacking, social engineering, and vulnerability assessment /Mohd Sohaib. - 1 online resource (432 pages)
Includes bibliographical references and index.
Ethical hacker's certification guide (CEHv11) : a comprehensive guide on penetration testing including network hacking, social engineering, and vulnerability assessment -- About the Author -- About the Reviewer -- Acknowledgement -- Preface -- Table of Contents -- Chapter 1. Cyber Security, Ethical Hacking, and Penetration Testing -- Chapter 2. CEH v11 Prerequisites and Syllabus -- Chapter 3. Self- Assessment -- Chapter 4. Reconnaissance -- Chapter 5. Social Engineering -- Chapter 6. Scanning Networks -- Chapter 7. Enumeration -- Chapter 8. Vulnerability Assessment -- Chapter 9. System Hacking -- Chapter 10. Session Hijacking -- Chapter 11. Web Server Hacking -- Chapter 12. Web Application Hacking -- Chapter 13. Hacking Wireless Networks -- Chapter 14. Hacking Mobile Platforms -- Chapter 15. Hacking Cloud, IoT, and OT Platforms -- Chapter 16. Cryptography -- Chapter 17. Evading Security Measures -- Chapter 18. Practical Exercises on Penetration Testing and Malware Attacks -- Chapter 19. Roadmap for a Security Professional -- Chapter 20. Digital Compliances and Cyber Laws -- Chapter 21. Self- Assessment 1 -- Chapter 22. Self- Assessment 2 -- Index.
Access restricted to authorized users and institutions.
The 'Certified Ethical Hacker's Guide' summarises all the ethical hacking and penetration testing fundamentals you'll need to get started professionally in the digital security landscape. The readers will be able to approach the objectives globally, and the knowledge will enable them to analyze and structure the hacks and their findings in a better way. The book begins by making you ready for the journey of a seasonal, ethical hacker. You will get introduced to very specific topics such as reconnaissance, social engineering, network intrusion, mobile and cloud hacking, and so on. Throughout the book, you will find many practical scenarios and get hands-on experience using tools such as Nmap, BurpSuite, OWASP ZAP, etc. Methodologies like brute-forcing, wardriving, evil twining, etc. are explored in detail. You will also gain a stronghold on theoretical concepts such as hashing, network protocols, architecture, and data encryption in real-world environments. In the end, the evergreen bug bounty programs and traditional career paths for safety professionals will be discussed. The reader will also have practical tasks and self-assessment exercises to plan further paths of learning and certification.
Mode of access: World Wide Web.
ISBN: 9789391392161Subjects--Topical Terms:
1483837
COMPUTERS / Security / Cryptography & Encryption.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: QA76.3
Dewey Class. No.: 005.8
Ethical hacker's certification guide (CEHv11) : = a comprehensive guide on penetration testing including network hacking, social engineering, and vulnerability assessment /
LDR
:03444nam a2200289 i 4500
001
1157318
006
m eo d
007
cr cn |||m|||a
008
250717s2021 ob 000 0 eng d
020
$a
9789391392161
020
$a
9789391392215
035
$a
BPB0000544
041
0
$a
eng
050
0 0
$a
QA76.3
082
0 0
$a
005.8
100
1
$a
Sohaib, Mohd.
$3
1483917
245
1 0
$a
Ethical hacker's certification guide (CEHv11) :
$b
a comprehensive guide on penetration testing including network hacking, social engineering, and vulnerability assessment /
$c
Mohd Sohaib.
264
1
$a
[Place of publication not identified] :
$b
BPB Publications,
$c
2021.
264
4
$c
©2022
300
$a
1 online resource (432 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0
$a
Ethical hacker's certification guide (CEHv11) : a comprehensive guide on penetration testing including network hacking, social engineering, and vulnerability assessment -- About the Author -- About the Reviewer -- Acknowledgement -- Preface -- Table of Contents -- Chapter 1. Cyber Security, Ethical Hacking, and Penetration Testing -- Chapter 2. CEH v11 Prerequisites and Syllabus -- Chapter 3. Self- Assessment -- Chapter 4. Reconnaissance -- Chapter 5. Social Engineering -- Chapter 6. Scanning Networks -- Chapter 7. Enumeration -- Chapter 8. Vulnerability Assessment -- Chapter 9. System Hacking -- Chapter 10. Session Hijacking -- Chapter 11. Web Server Hacking -- Chapter 12. Web Application Hacking -- Chapter 13. Hacking Wireless Networks -- Chapter 14. Hacking Mobile Platforms -- Chapter 15. Hacking Cloud, IoT, and OT Platforms -- Chapter 16. Cryptography -- Chapter 17. Evading Security Measures -- Chapter 18. Practical Exercises on Penetration Testing and Malware Attacks -- Chapter 19. Roadmap for a Security Professional -- Chapter 20. Digital Compliances and Cyber Laws -- Chapter 21. Self- Assessment 1 -- Chapter 22. Self- Assessment 2 -- Index.
506
$a
Access restricted to authorized users and institutions.
520
3
$a
The 'Certified Ethical Hacker's Guide' summarises all the ethical hacking and penetration testing fundamentals you'll need to get started professionally in the digital security landscape. The readers will be able to approach the objectives globally, and the knowledge will enable them to analyze and structure the hacks and their findings in a better way. The book begins by making you ready for the journey of a seasonal, ethical hacker. You will get introduced to very specific topics such as reconnaissance, social engineering, network intrusion, mobile and cloud hacking, and so on. Throughout the book, you will find many practical scenarios and get hands-on experience using tools such as Nmap, BurpSuite, OWASP ZAP, etc. Methodologies like brute-forcing, wardriving, evil twining, etc. are explored in detail. You will also gain a stronghold on theoretical concepts such as hashing, network protocols, architecture, and data encryption in real-world environments. In the end, the evergreen bug bounty programs and traditional career paths for safety professionals will be discussed. The reader will also have practical tasks and self-assessment exercises to plan further paths of learning and certification.
538
$a
Mode of access: World Wide Web.
650
7
$a
COMPUTERS / Security / Cryptography & Encryption.
$2
bisacsh
$3
1483837
650
7
$a
COMPUTERS / Networking / Network Protocols.
$2
bisacsh
$3
1483839
650
7
$a
COMPUTERS / Security / Viruses & Malware.
$2
bisacsh
$3
1483841
655
4
$a
Electronic books.
$2
local
$3
554714
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/BPB0000544.html
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入