Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Start tilbuddet
DK - Details page - Device banner - 894x1036

Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1

Længde
5T 45M
Sprog
Engelsk
Format
Kategori

Fakta

2 AUDIOBOOKS IN 1!

• Book 1 - How To Build Your Pen Test Lab Fast • Book 2 - How To Defend Against Hackers & Malware

BUY THIS AUDIOBOOK NOW AND GET STARTED TODAY!

You will learn:

AUDIOBOOK 1:

What are the Frameworks of Penetration Testing

What Scanning Tools you should be Aware

What Credential Testing Tools you must Utilize

How to Setup a Lab in NPE

How to Setup Hyper-V on Windows 10

How to Setup VMware on Windows 10

How to Assemble the Required Resources

How to Configure Windows Server in VMware

How to Configure Windows Server in Hyper-V

How to Install & Configure OWASP-BWA in VMware

How to Install & Configure Metasploitable in VMware

How to Install Kali Linux in VMware

How to Install BlackArch in Hyper-V

What are the Rules of Engagement

How to set Objectives & Deliverables

What Type of Targets you must deal with

Specialized Systems for Pen Testers

How to Identify & Response to Risk

How to Prepare your Pen Test Team for an Engagement

AUDIOBOOK 2:

How to use Trend Analysis to Prevent Intrusion

What is Data Aggregation and Correlation

What is Defense in Depth

What Breach Detection Tools you can Deploy

What is and How to Deploy EMET aka Enhanced Mitigation Experience Toolkit

Why you must use Web Application Firewalls VS Proxys

What is Pen Testing and how to Identify Security Flows

What Pen Test Procedures you must follow

How Reverse Engineering Works

What Risk Evaluation Steps you must Follow

What are the Policy Framework Procedures

What are the Control Framework Procedures

What is and how to Deploy Quality Controls & Verification Processes, and much more...

© 2020 ATTILA KOVACS (Lydbog): 9781664951624

Release date

Lydbog: 27. november 2020

Andre kan også lide...

  1. Hacking: How to Hack Alex Wagner
  2. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  3. Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 HUGO HOFFMAN
  4. CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1 John Knowles
  5. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  6. Coders: Who They Are, What They Think and How They Are Changing Our World Clive Thompson
  7. Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test Peter Bradley
  8. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
  9. Permanent Record: A Memoir of a Reluctant Whistleblower Edward Snowden
  10. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  11. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  12. Greatest Hackers in the History Introbooks Team
  13. Linux for Beginners: 3 BOOKS IN 1 ATTILA KOVACS
  14. Hacking: The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Kevin Clark
  15. Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 John Knowles
  16. Linux for Beginners: How to Perform Linux Admin Tasks ATTILA KOVACS
  17. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
  18. Computer Programming and Cybersecurity for Beginners: All You Need to Know to Get Started with Python for Data Science, Excel and Ethical Hacking Kevin Clark
  19. Free Will Sam Harris
  20. How Smart Machines Think Sean Gerrish
  21. Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Eric Cole
  22. The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution Walter Isaacson
  23. A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Bruce Schneier
  24. Bad Blood: Secrets and Lies in a Silicon Valley Startup John Carreyrou
  25. The Fourth Age: Smart Robots, Conscious Computers, and the Future of Humanity Byron Reese
  26. Cybersecurity and Cyberwar: What Everyone Needs to Know Allan Friedman
  27. The Pleasure of Finding Things Out: The Best Short Works of Richard P. Feynman Richard P. Feynman
  28. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  29. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
  30. Social Engineering: The Art of Human Hacking Christopher Hadnagy
  31. Ethical Hacking Introbooks Team
  32. The Art of Deception: Controlling the Human Element of Security William L. Simon
  33. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
  34. The Pentester BluePrint: Starting a Career as an Ethical Hacker Phillip L. Wylie
  35. Tor and the Dark Art of Anonymity Lance Henderson
  36. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
  37. Cloud Security For Dummies Ted Coombs
  38. Not Always Safe: A Cyber Crime Podcast Neelam Jain
  39. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Bruce Schneier
  40. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
  41. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
  42. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
  43. Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff

Vælg dit abonnement

  • Over 600.000 titler

  • Download og nyd titler offline

  • Eksklusive titler + Mofibo Originals

  • Børnevenligt miljø (Kids Mode)

  • Det er nemt at opsige når som helst

Flex

For dig som vil prøve Mofibo.

89 kr. /måned
  • 1 konto

  • 20 timer/måned

  • Gem op til 100 ubrugte timer

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Prøv gratis
Den mest populære

Premium

For dig som lytter og læser ofte.

129 kr. /måned
  • 1 konto

  • 100 timer/måned

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Unlimited

For dig som lytter og læser ubegrænset.

149 kr. /måned
  • 1 konto

  • Ubegrænset adgang

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Family

For dig som ønsker at dele historier med familien.

Fra 179 kr. /måned
  • 2-6 konti

  • 100 timer/måned pr. konto

  • Fri lytning til podcasts

  • Kun 39 kr. pr. ekstra konto

  • Ingen binding

2 konti

179 kr. /måned
Prøv gratis