This audiobook is narrated by a digital voice.
A comprehensive study guide for GIAC (SANS Institute) certification exams, covering advanced cybersecurity concepts, penetration testing methodologies, exploit development, and digital forensics. Designed for security professionals, ethical hackers, and penetration testers, it provides in-depth explanations of key topics and practical exercises to reinforce learning.
The book explores network security, including bypassing firewalls, MITM attacks, ARP spoofing, DNS poisoning, and exploiting insecure protocols. It also delves into web application exploitation, covering SQL injection (SQLi), cross-site scripting (XSS), server-side request forgery (SSRF), and remote code execution (RCE). Readers will gain expertise in privilege escalation, post-exploitation techniques, and advanced Windows and Linux exploitation.
The exploit development section covers stack-based buffer overflows, return-oriented programming (ROP), structured exception handler (SEH) exploits, and format string attacks. Advanced topics include cryptographic attacks, fuzzing, memory corruption, and shellcode development. The book also addresses wireless and IoT security, Active Directory (AD) exploitation, and cloud security vulnerabilities.
Practical hands-on labs, scripting techniques using Python, PowerShell, and Metasploit, along with exam preparation strategies, make this guide a must-have for those pursuing GIAC certifications such as GXPN, GCIH, GPEN, and OSCP. Whether you are preparing for an exam or enhancing your penetration testing and security analysis skills, this book equips you with the technical knowledge and practical expertise needed to excel in cybersecurity
This audiobook is narrated by a digital voice.
A comprehensive study guide for GIAC (SANS Institute) certification exams, covering advanced cybersecurity concepts, penetration testing methodologies, exploit development, and digital forensics. Designed for security professionals, ethical hackers, and penetration testers, it provides in-depth explanations of key topics and practical exercises to reinforce learning.
The book explores network security, including bypassing firewalls, MITM attacks, ARP spoofing, DNS poisoning, and exploiting insecure protocols. It also delves into web application exploitation, covering SQL injection (SQLi), cross-site scripting (XSS), server-side request forgery (SSRF), and remote code execution (RCE). Readers will gain expertise in privilege escalation, post-exploitation techniques, and advanced Windows and Linux exploitation.
The exploit development section covers stack-based buffer overflows, return-oriented programming (ROP), structured exception handler (SEH) exploits, and format string attacks. Advanced topics include cryptographic attacks, fuzzing, memory corruption, and shellcode development. The book also addresses wireless and IoT security, Active Directory (AD) exploitation, and cloud security vulnerabilities.
Practical hands-on labs, scripting techniques using Python, PowerShell, and Metasploit, along with exam preparation strategies, make this guide a must-have for those pursuing GIAC certifications such as GXPN, GCIH, GPEN, and OSCP. Whether you are preparing for an exam or enhancing your penetration testing and security analysis skills, this book equips you with the technical knowledge and practical expertise needed to excel in cybersecurity

GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) X=Certification Exam Guide

GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) X=Certification Exam Guide
FREE
with a B&N Audiobooks Subscription
Product Details
BN ID: | 2940194105489 |
---|---|
Publisher: | Anand Vemula |
Publication date: | 03/31/2025 |
Edition description: | Unabridged |
Videos
