Hands-On Ethical Hacking and Network Defense
portes grátis
Hands-On Ethical Hacking and Network Defense
Simpson, Michael; Antill, Nicholas; Wilson, Rob
Cengage Learning, Inc
03/2022
448
Mole
Inglês
9780357509753
15 a 20 dias
839
Descrição não disponível.
Module 1. Ethical Hacking Overview.
Module 2. TCP/IP Concepts Review.
Module 3. Network and Computer Attacks.
Module 4. Footprinting and Social Engineering.
Module 5. Port Scanning.
Module 7. Programming for Security Professionals.
Module 8. Desktop and Server OS Vulnerabilities.
Module 9. Embedded Operating Systems: The Hidden Threat.
Module 10. Hacking Web Applications.
Module 11. Hacking Wireless Networks.
Module 12. Cryptography.
Module 13. Network Protection Systems.
Module 14. The Final Project.
Appendix A. Legal Resources.
Appendix B. Resources.
Module 2. TCP/IP Concepts Review.
Module 3. Network and Computer Attacks.
Module 4. Footprinting and Social Engineering.
Module 5. Port Scanning.
Module 7. Programming for Security Professionals.
Module 8. Desktop and Server OS Vulnerabilities.
Module 9. Embedded Operating Systems: The Hidden Threat.
Module 10. Hacking Web Applications.
Module 11. Hacking Wireless Networks.
Module 12. Cryptography.
Module 13. Network Protection Systems.
Module 14. The Final Project.
Appendix A. Legal Resources.
Appendix B. Resources.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
ethical hacking; hacking; network defense; networking; defense; hands-on; security; security testing; security professionals; cyber terrorism; security testers; computer networks; attackers; cyber security; cybersecurity; Wilson; Rob Wilson; Simpson; Michael Simpson; penetration testing; pen testing; CEH
Module 1. Ethical Hacking Overview.
Module 2. TCP/IP Concepts Review.
Module 3. Network and Computer Attacks.
Module 4. Footprinting and Social Engineering.
Module 5. Port Scanning.
Module 7. Programming for Security Professionals.
Module 8. Desktop and Server OS Vulnerabilities.
Module 9. Embedded Operating Systems: The Hidden Threat.
Module 10. Hacking Web Applications.
Module 11. Hacking Wireless Networks.
Module 12. Cryptography.
Module 13. Network Protection Systems.
Module 14. The Final Project.
Appendix A. Legal Resources.
Appendix B. Resources.
Module 2. TCP/IP Concepts Review.
Module 3. Network and Computer Attacks.
Module 4. Footprinting and Social Engineering.
Module 5. Port Scanning.
Module 7. Programming for Security Professionals.
Module 8. Desktop and Server OS Vulnerabilities.
Module 9. Embedded Operating Systems: The Hidden Threat.
Module 10. Hacking Web Applications.
Module 11. Hacking Wireless Networks.
Module 12. Cryptography.
Module 13. Network Protection Systems.
Module 14. The Final Project.
Appendix A. Legal Resources.
Appendix B. Resources.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
ethical hacking; hacking; network defense; networking; defense; hands-on; security; security testing; security professionals; cyber terrorism; security testers; computer networks; attackers; cyber security; cybersecurity; Wilson; Rob Wilson; Simpson; Michael Simpson; penetration testing; pen testing; CEH