Ethical hacking learning the basics

"The video is divided into six sections, covering various aspects of ethical hacking for a beginner to grasp. Starting with an introduction to the basics of ethical hacking, you will go through common terminologies used and also learn to install your first virtual machine. You will then take a...

Full description

Bibliographic Details
Main Author: Gupta, Sunil
Format: eBook
Language:English
Published: [Place of publication not identified] Apress 2018
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 02279nmm a2200373 u 4500
001 EB001920042
003 EBX01000000000000001082944
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
050 4 |a QA76.9.A25 
100 1 |a Gupta, Sunil 
245 0 0 |a Ethical hacking  |b learning the basics  |c Sunil Gupta 
260 |a [Place of publication not identified]  |b Apress  |c 2018 
300 |a 1 streaming video file (1 hr., 5 min., 27 sec.) 
653 |a Hacking / fast / (OCoLC)fst01909643 
653 |a Penetration testing (Computer security) / fast / (OCoLC)fst01789566 
653 |a Sécurité informatique 
653 |a Piratage informatique 
653 |a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277 
653 |a Computer networks / Security measures / fast / (OCoLC)fst00872341 
653 |a Tests d'intrusion 
653 |a Computer security / fast / (OCoLC)fst00872484 
653 |a Réseaux d'ordinateurs / Sécurité / Mesures 
653 |a Hacking / http://id.loc.gov/authorities/subjects/sh2013002597 
653 |a Penetration testing (Computer security) / http://id.loc.gov/authorities/subjects/sh2011003137 
653 |a Computer security / http://id.loc.gov/authorities/subjects/sh90001862 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
500 |a Title from resource description page (Safari, viewed January 18, 2019) 
856 4 0 |u https://learning.oreilly.com/videos/~/9781484243480/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 000 
520 |a "The video is divided into six sections, covering various aspects of ethical hacking for a beginner to grasp. Starting with an introduction to the basics of ethical hacking, you will go through common terminologies used and also learn to install your first virtual machine. You will then take a look at various Linux terminal commands and also learn to perform basic operations with them. The following sections will introduce footprinting and vulnerability scanning, where you will learn how these processes work by going through examples. In conclusion, you will learn what exploitation is and how a minor vulnerability in the system can lead to a breach."--Resource description page