Mastering Cybersecurity - A Practical Guide to Cyber Tools & Techniques (Volume 2)
In today's ever-evolving digital landscape, cybersecurity professionals are in high demand. These books equip you with the knowledge and tools to become a master cyber defender. The handbooks take you through the journey of ten essential aspects of practical learning and mastering cybersecurity aspects in the form of two volumes. Volume 2: The journey continues with volume two for mastering advanced techniques for network traffic analysis using Wireshark and other network sniffers. Then, we unlock the power of Open-Source Intelligence (OSINT) to gather valuable intel from publicly available sources, including social media, web, images, and others. From there, explore the unique challenges of securing the Internet of Things (IoT) and conquer the art of reconnaissance, the crucial first stage of ethical hacking. Finally, we explore the dark web - a hidden corner of the internet - and learn safe exploration tactics to glean valuable intelligence. The book concludes by teaching you how to exploit vulnerabilities ethically during penetration testing and write pen test reports that provide actionable insights for remediation.
1147372791
Mastering Cybersecurity - A Practical Guide to Cyber Tools & Techniques (Volume 2)
In today's ever-evolving digital landscape, cybersecurity professionals are in high demand. These books equip you with the knowledge and tools to become a master cyber defender. The handbooks take you through the journey of ten essential aspects of practical learning and mastering cybersecurity aspects in the form of two volumes. Volume 2: The journey continues with volume two for mastering advanced techniques for network traffic analysis using Wireshark and other network sniffers. Then, we unlock the power of Open-Source Intelligence (OSINT) to gather valuable intel from publicly available sources, including social media, web, images, and others. From there, explore the unique challenges of securing the Internet of Things (IoT) and conquer the art of reconnaissance, the crucial first stage of ethical hacking. Finally, we explore the dark web - a hidden corner of the internet - and learn safe exploration tactics to glean valuable intelligence. The book concludes by teaching you how to exploit vulnerabilities ethically during penetration testing and write pen test reports that provide actionable insights for remediation.
59.99 Pre Order
Mastering Cybersecurity - A Practical Guide to Cyber Tools & Techniques (Volume 2)

Mastering Cybersecurity - A Practical Guide to Cyber Tools & Techniques (Volume 2)

by Akashdeep Bhardwaj
Mastering Cybersecurity - A Practical Guide to Cyber Tools & Techniques (Volume 2)

Mastering Cybersecurity - A Practical Guide to Cyber Tools & Techniques (Volume 2)

by Akashdeep Bhardwaj

Paperback

$59.99 
  • SHIP THIS ITEM
    Available for Pre-Order. This item will be released on October 21, 2025

Related collections and offers


Overview

In today's ever-evolving digital landscape, cybersecurity professionals are in high demand. These books equip you with the knowledge and tools to become a master cyber defender. The handbooks take you through the journey of ten essential aspects of practical learning and mastering cybersecurity aspects in the form of two volumes. Volume 2: The journey continues with volume two for mastering advanced techniques for network traffic analysis using Wireshark and other network sniffers. Then, we unlock the power of Open-Source Intelligence (OSINT) to gather valuable intel from publicly available sources, including social media, web, images, and others. From there, explore the unique challenges of securing the Internet of Things (IoT) and conquer the art of reconnaissance, the crucial first stage of ethical hacking. Finally, we explore the dark web - a hidden corner of the internet - and learn safe exploration tactics to glean valuable intelligence. The book concludes by teaching you how to exploit vulnerabilities ethically during penetration testing and write pen test reports that provide actionable insights for remediation.

Product Details

ISBN-13: 9781032893921
Publisher: CRC Press
Publication date: 10/21/2025
Pages: 336
Product dimensions: 6.12(w) x 9.19(h) x (d)

About the Author

Dr. Akashdeep Bhardwaj is working as Professor and Head of Cybersecurity (Center of Excellence) at University of Petroleum & Energy Studies (UPES), Dehradun, India. An eminent IT Industry expert with over 28 years of experience in areas such as Cybersecurity, Digital Forensics and IT Operations, Dr. Akashdeep mentors’ Cyber graduates, masters and doctoral students and leads industry projects and research in his university. Dr. Akashdeep is a Post-Doctoral from Majmaah University, Saudi Arabia, and a Ph.D. in Computer Science. Dr. Akashdeep has published over 135 research works (including copyrights, patents, research papers, authored & edited books) in highly referred international journals. Dr. Akashdeep has worked as Technology Leader for several multinational organizations during his time in the IT industry. Dr. Akashdeep is certified in IT, Cybersecurity and Digital Forensics technologies including Compliance Audits, Networking Cybersecurity, Digital Forensics and holds multiple industry certifications.

Table of Contents

11. Chapter 1: Networking for Cyber Professionals Learn about the basics of networking, protocols, ports from Cybersecurity perspectives. 12. Chapter 2: Deciphering Data Streams: Network Traffic Analysis Master the art of network traffic analysis using industry-standard tools to identify suspicious network activity and potential data breaches. 13. Chapter 3: Open-Source Intelligence: Harnessing Intelligence from Digital space Discover the power of OSINT and learn to unveil digital footprints. 14. Chapter 4: Hands-on OSINT Investigations Conduct real-world OSINT investigations, harnessing social media, web, and publicly available sources for gathering valuable intelligence. 15. Chapter 5: Securing of Smart Interconnected Devices Explore the unique challenges of securing smart devices and internet-connected devices (IoT). 16. Chapter 6: Ethical Hacking of Smart IoT Devices Perform penetration testing of Smart interconnected ecosystems to expose and exploit vulnerabilities. 17. Chapter 7: Into the Shadows: Theory of Dark Web Investigations Go beyond the surface web and delve into the hidden online world of the dark web. 18. Chapter 8: Hands-on Dark Web Investigations Learn safe exploration techniques to gather intelligence from hidden forums and marketplaces to stay ahead of potential threats. 19. Chapter 9: Exploit the Gaps: Theory of Ethical Exploitation and Reporting Master the art of Ethical Hacking during penetration testing. Learn to document your findings. 20. Chapter 10: Hands-on Exploitation of OS & Apps Master the art of exploiting vulnerabilities ethically during pen testing. Write compelling penetration testing reports that provide actionable insights for remediation.
From the B&N Reads Blog

Customer Reviews