Hands-On Ethical Hacking Tactics: Strategies, tools, and techniques for effective cyber defense

If you’re an ethical hacker looking to boost your digital defenses and stay up to date with the evolving cybersecurity landscape, then this book is for you. Hands-On Ethical Hacking Tactics is a comprehensive guide that will take you from fundamental to advanced levels of ethical hacking, offering insights into both offensive and defensive techniques. Written by a seasoned professional with 20+ years of experience, this book covers attack tools, methodologies, and procedures, helping you enhance your skills in securing and defending networks.
The book starts with foundational concepts such as footprinting, reconnaissance, scanning, enumeration, vulnerability assessment, and threat modeling. Next, you’ll progress to using specific tools and procedures for hacking Windows, Unix, web servers, applications, and databases. The book also gets you up to speed with malware analysis. Throughout the book, you’ll experience a smooth transition from theoretical concepts to hands-on techniques using various platforms. Finally, you’ll explore incident response, threat hunting, social engineering, IoT hacking, and cloud exploitation, which will help you address the complex aspects of ethical hacking.
By the end of this book, you’ll have gained the skills you need to navigate the ever-changing world of cybersecurity.

1144781009
Hands-On Ethical Hacking Tactics: Strategies, tools, and techniques for effective cyber defense

If you’re an ethical hacker looking to boost your digital defenses and stay up to date with the evolving cybersecurity landscape, then this book is for you. Hands-On Ethical Hacking Tactics is a comprehensive guide that will take you from fundamental to advanced levels of ethical hacking, offering insights into both offensive and defensive techniques. Written by a seasoned professional with 20+ years of experience, this book covers attack tools, methodologies, and procedures, helping you enhance your skills in securing and defending networks.
The book starts with foundational concepts such as footprinting, reconnaissance, scanning, enumeration, vulnerability assessment, and threat modeling. Next, you’ll progress to using specific tools and procedures for hacking Windows, Unix, web servers, applications, and databases. The book also gets you up to speed with malware analysis. Throughout the book, you’ll experience a smooth transition from theoretical concepts to hands-on techniques using various platforms. Finally, you’ll explore incident response, threat hunting, social engineering, IoT hacking, and cloud exploitation, which will help you address the complex aspects of ethical hacking.
By the end of this book, you’ll have gained the skills you need to navigate the ever-changing world of cybersecurity.

39.99 In Stock
Hands-On Ethical Hacking Tactics: Strategies, tools, and techniques for effective cyber defense

Hands-On Ethical Hacking Tactics: Strategies, tools, and techniques for effective cyber defense

Hands-On Ethical Hacking Tactics: Strategies, tools, and techniques for effective cyber defense

Hands-On Ethical Hacking Tactics: Strategies, tools, and techniques for effective cyber defense

eBook

$39.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

If you’re an ethical hacker looking to boost your digital defenses and stay up to date with the evolving cybersecurity landscape, then this book is for you. Hands-On Ethical Hacking Tactics is a comprehensive guide that will take you from fundamental to advanced levels of ethical hacking, offering insights into both offensive and defensive techniques. Written by a seasoned professional with 20+ years of experience, this book covers attack tools, methodologies, and procedures, helping you enhance your skills in securing and defending networks.
The book starts with foundational concepts such as footprinting, reconnaissance, scanning, enumeration, vulnerability assessment, and threat modeling. Next, you’ll progress to using specific tools and procedures for hacking Windows, Unix, web servers, applications, and databases. The book also gets you up to speed with malware analysis. Throughout the book, you’ll experience a smooth transition from theoretical concepts to hands-on techniques using various platforms. Finally, you’ll explore incident response, threat hunting, social engineering, IoT hacking, and cloud exploitation, which will help you address the complex aspects of ethical hacking.
By the end of this book, you’ll have gained the skills you need to navigate the ever-changing world of cybersecurity.


Product Details

ISBN-13: 9781801818650
Publisher: Packt Publishing
Publication date: 05/17/2024
Sold by: Barnes & Noble
Format: eBook
Pages: 464
File size: 18 MB
Note: This product may take a few minutes to download.

About the Author

Shane Hartman, a seasoned professional with over 20 years in the computer security industry, currently serves as the Senior IR Consultant at TrustedSec. Holding a bachelor's degree in Business/e-business from the University of Phoenix and a master's in Digital Forensics from the University of Central Florida, Shane brings a wealth of academic and practical expertise to the field. With a notable CISSP certification and prior credentials, including MCSE, GREM, and GCIA, he has been actively engaged in the security discipline since 2005. In addition to Shane's extensive experience, he also teaches cybersecurity courses at the University of South Florida, including ethical hacking, digital forensics, and data analysis. This, coupled with a solid educational background, positions him as a leading authority in the dynamic realm of cybersecurity.

Table of Contents

Table of Contents
  1. Ethical Hacking Concepts
  2. Ethical Hacking Footprinting and Reconnaissance
  3. Ethical Hacking Scanning and Enumeration
  4. Ethical Hacking Vulnerability Assessment and Threat Modeling
  5. Hacking the Windows Operating System
  6. Hacking the Linux Operating System
  7. Ethical Hacking of Web Servers
  8. Hacking Databases
  9. Ethical Hacking Protocol Review
  10. Ethical Hacking for Malware Analysis
  11. Incident Response and Threat Hunting
  12. Social Engineering
  13. Ethical Hacking of the Internet of Things (IoT)
  14. Ethical Hacking in the Cloud
From the B&N Reads Blog

Customer Reviews