Cybersecurity attacks (Red Team activity)

"There is only way to become really good at cybersecurity: you must know both how to attack and how to defend. First of all, you have to learn to think like a hacker, so you deeply understand what the threats are. Then you'll need to know how to protect yourself from the attacks. We start...

Full description

Bibliographic Details
Main Author: Nesterenko, Sergii
Format: eBook
Language:English
Published: [Place of publication not identified] Packt 2018
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 02481nmm a2200361 u 4500
001 EB001916129
003 EBX01000000000000001079031
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
050 4 |a QA76.9.A25 
100 1 |a Nesterenko, Sergii 
245 0 0 |a Cybersecurity attacks (Red Team activity)  |c Sergii Nesterenko 
260 |a [Place of publication not identified]  |b Packt  |c 2018 
300 |a 1 streaming video file (3 hr., 35 min., 31 sec.) 
653 |a Computer security 
653 |a Criminalité informatique 
653 |a Sécurité informatique 
653 |a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277 
653 |a Computer networks / Security measures / fast / (OCoLC)fst00872341 
653 |a Computer crimes / http://id.loc.gov/authorities/subjects/sh85029492 
653 |a Computer security / fast / (OCoLC)fst00872484 
653 |a Réseaux d'ordinateurs / Sécurité / Mesures 
653 |a Computer crimes / fast / (OCoLC)fst00872063 
653 |a Computer Security 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
500 |a Title from title screen (viewed March 20, 2018). - Date of publication from resource description page 
856 4 0 |u https://learning.oreilly.com/videos/~/9781788478878/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 000 
082 0 |a 364.1 
520 |a "There is only way to become really good at cybersecurity: you must know both how to attack and how to defend. First of all, you have to learn to think like a hacker, so you deeply understand what the threats are. Then you'll need to know how to protect yourself from the attacks. We start with precise descriptions and examples of network attacks to show you how the malicious hackers can break into your network--and what harm they can do. Then we'll look at another attack vector: websites and web-applications. You'll see the most vulnerable places and understand what cybercriminals will do if they find them. Then we'll discover the third vector of attacks: humans. Refined hackers know how to hack a human brain first to hack digital assets. You'll find out what social engineering, phishing, and spear-phishings, and why they're becoming especially dangerous today. By the end of this course, you'll be able to locate all your vulnerabilities and remediate them before malicious hackers find and exploit them."--Resource description page