Ethical hacking workshop explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity

The Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools. By exploring the thought process involved in ethical hacking and the various techniques you can use to obtain results, you'll gain a deep understanding of ho...

Full description

Bibliographic Details
Main Authors: Pillay, Rishalin, Abutheraa, Mohammed (Author)
Format: eBook
Language:English
Published: Birmingham Packt Publishing 2023
Edition:1st edition
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 02124nmm a2200301 u 4500
001 EB002187445
003 EBX01000000000000001324930
005 00000000000000.0
007 cr|||||||||||||||||||||
008 231204 ||| eng
050 4 |a QA76.9.A25 
100 1 |a Pillay, Rishalin 
245 0 0 |a Ethical hacking workshop  |b explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity  |c Rishalin Pillay, Mohammed Abutheraa 
250 |a 1st edition 
260 |a Birmingham  |b Packt Publishing  |c 2023 
300 |a 287 pages  |b illustrations 
653 |a Penetration testing (Computer security) / fast / (OCoLC)fst01789566 
653 |a Tests d'intrusion 
653 |a Penetration testing (Computer security) / http://id.loc.gov/authorities/subjects/sh2011003137 
700 1 |a Abutheraa, Mohammed  |e author 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
500 |a Includes index 
776 |z 1804612596 
776 |z 9781804612590 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781804612590/?ar  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a The Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools. By exploring the thought process involved in ethical hacking and the various techniques you can use to obtain results, you'll gain a deep understanding of how to leverage these skills effectively. Throughout this book, you'll learn how to conduct a successful ethical hack, how to use the tools correctly, and how to interpret the results to enhance your environment's security. By the end of the book, you'll be well-versed in ethical hacking and equipped with the skills and knowledge necessary to safeguard your enterprise against cyber-attacks. The book is intended to be read by those who are looking to learn about ethical hacking. Individuals who are part of security teams, blue teams, purple teams and not limited to security analysts will benefit from this book. The readers should have a good understanding of cloud computing and networking