|
|
|
|
LEADER |
02287nmm a2200301 u 4500 |
001 |
EB002003684 |
003 |
EBX01000000000000001166585 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
211025 ||| eng |
050 |
|
4 |
|a TK5105.59
|
100 |
1 |
|
|a Krahenbill, Cliff
|e presenter
|
245 |
0 |
0 |
|a Digital forensics for pentesters
|b hands-on learning
|
250 |
|
|
|a [First edition]
|
260 |
|
|
|a [Place of publication not identified]
|b Packt Publishing
|c 2021
|
300 |
|
|
|a 1 video file (7 hr., 30 min.)
|b sound, color
|
653 |
|
|
|a Penetration testing (Computer security) / fast / (OCoLC)fst01789566
|
653 |
|
|
|a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277
|
653 |
|
|
|a Computer networks / Security measures / fast / (OCoLC)fst00872341
|
653 |
|
|
|a Tests d'intrusion
|
653 |
|
|
|a Réseaux d'ordinateurs / Sécurité / Mesures
|
653 |
|
|
|a Penetration testing (Computer security) / http://id.loc.gov/authorities/subjects/sh2011003137
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781803231969/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 331
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a Learn about digital forensics, pentesting, and ethical hacking About This Video Learn about using Kali Forensic Mode and Autopsy Explore open source intelligence and OSINT Learn how to dump Wi-Fi credentials using netsh In Detail Digital forensics is becoming very important in cyber security to detect and backtrack Black Hat criminals. It is essential to remove hackers' malicious backdoors/malware and trace them back to avoid possible future incidents. This course acts as digital forensics' primer for pentesters and cybersecurity professionals wanting to expand their knowledge and add advanced tools and skills to their resumes. Make sure you understand the difference between watching and applying. The course is an excellent primer for anyone considering a career in digital forensics. It's important to understand the difference between digital forensics and computer security. Who this book is for This course is for pentesters interested in digital forensic investigations and for anyone interested in digital forensics as it relates to pentesting and ethical hacking
|