Слушайте и четете неограничено

Открийте безкрайна вселена от истории

  • Слушайте и четете неограничено
  • Над 500 000 заглавия
  • Ексклузивни и Storytel Original заглавия
  • Можете да прекратите лесно по всяко време
Пробвайте Storytel
BG - Details page - Device banner - 894x1036

Ultimate Penetration Testing with Nmap

Език
Английски
Format
Категория

Документални

Master one of the most essential tools a professional pen tester needs to know.

Book Description This essential handbook offers a systematic journey through the intricacies of Nmap, providing both novice and seasoned professionals with the tools and techniques needed to conduct thorough security assessments with confidence. The purpose of this book is to educate and empower cyber security professionals to increase their skill set, and by extension, contribute positively to the cyber security posture of organizations through the use of Nmap.

This book starts at the ground floor by establishing a baseline understanding of what Penetration Testing is, how it is similar but distinct from other types of security engagements, and just how powerful of a tool Nmap can be to include in a pen tester’s arsenal. By systematically building the reader's proficiency through thought-provoking case studies, guided hands-on challenges, and robust discussions about how and why to employ different techniques, the reader will finish each chapter with new tangible skills.

With practical best practices and considerations, you'll learn how to optimize your Nmap scans while minimizing risks and false positives.

Table of Contents 1. Introduction to Nmap and Security Assessments 2. Setting Up a Lab Environment For Nmap 3. Introduction to Attack Surface Mapping 4. Identifying Vulnerabilities Through Reconnaissance and Enumeration 5. Mapping a Large Environment 6. Leveraging Zenmap and Legion 7. Advanced Obfuscation and Firewall Evasion Techniques 8. Leveraging the Nmap Scripting Engine 9. Best Practices and Considerations APPENDIX A. Additional Questions APPENDIX B. Nmap Quick Reference Guide Index

© 2024 Orange Education Pvt Ltd (Е-книга): 9788197081880

Дата на публикуване

Е-книга: 31 март 2024 г.

Разгледай още от

    Другите харесаха също...

    1. Infrastructure Attack Strategies for Ethical Hacking Himanshu Sharma
    2. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
    3. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
    4. Ethical Hacking: A Beginner’s Guide to Cybersecurity Mastery: Learn Skills to Protect Against Cyber Threats Effectively Nora Simmons
    5. Cybercrime and the Darknet: Revealing the hidden underworld of the internet Cath Senker
    6. Secure Edge Computing for IoT Oluyemi Odeyinka
    7. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
    8. Defensive Security Handbook: Best Practices for Securing Infrastructure (2nd Edition) Amanda Berlin
    9. The Art of Deception: Controlling the Human Element of Security William L. Simon
    10. Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing Roger A. Grimes
    11. CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) Andrew Hutz
    12. CompTIA Network+: 3 in 1- Beginner's Guide+ Tips and Tricks+ Simple and Effective Strategies to Learn About CompTIA Network+ Certification Walker Schmidt
    13. Hacking API: Navigating the Intricacies of API Security and Ethical Hacking James Ferry
    14. The DevSecOps Playbook: Deliver Continuous Security at Speed Sean D. Mack
    15. Cybersecutity First Principles Rick Howard
    16. Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
    17. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
    18. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
    19. Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology Diana Graber
    20. Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
    21. Cybersecurity for Beginners: Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide Kevin Clark
    22. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
    23. A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Bruce Schneier
    24. Social Engineering: The Art of Human Hacking Christopher Hadnagy
    25. Cyber Security: Beginners’ Guide to Hacking, Phishing, Social Engineering, and Malware Jonathan Rigdon
    26. The Software Developer's Career Handbook: A Guide to Navigating the Unpredictable Michael Lopp
    27. Cybersecurity For Dummies Joseph Steinberg
    28. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
    29. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
    30. The New Age of Sexism: How the AI Revolution is Reinventing Misogyny Laura Bates
    31. Life on the Edge - The Coming of Age of Quantum Biology Johnjoe McFadden
    32. Hacking: How to Hack Alex Wagner
    33. Ultimate Cyberwarfare for Evasive Cyber Tactics Chang Tan
    34. Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST ATTILA KOVACS
    35. Ultimate Kali Linux Book, Second Edition: Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire Gllen D. Singh
    36. Docker Unboxed: Mastering Modern Infrastructure with Container Technology Sophia Bell
    37. Docker Essentials: Simplifying containerization : A Beginner's Guide Mike Wilson
    38. Security Chaos Engineering: Sustaining Resilience in Software and Systems Aaron Rinehart
    39. Spying Blind: The CIA, the FBI, and the Origins of 9/11 Amy B. Zegart
    40. CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition Mike Chapple
    41. Linux for Beginners: How to Perform Linux Admin Tasks ATTILA KOVACS
    42. Advanced Analytics with Power BI and Excel Dejan Sarka
    43. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III

    Избери своя абонамент:

    • Над 500 000 заглавия

    • Сваляте книги за офлайн слушане

    • Ексклузивни заглавия + Storytel Original

    • Детски режим (безопасна зона за деца)

    • Лесно прекратявате по всяко време

    Най-популярен

    Unlimited

    Най-добрият избор. Открийте хиляди незабравими истории.

    7.66 € | 14.99 лв. /месец
    • 1 профил

    • Неограничен достъп

    • Избирайте от хиляди заглавия

    • Слушайте и четете неограничено

    • Прекратете по всяко време

    Пробвайте сега

    Unlimited Годишен

    Спестете 33%! Избирайте от хиляди заглавия.

    61.35 € | 119.99 лв. /година
    7 дни безплатно
    12 месеца на цената на 8
    • 1 профил

    • Неограничен достъп

    • 5.11 € | 9.99 лв. на месец

    • Слушайте и четете неограничено

    • Прекратете по всяко време

    Пробвайте 7 дни безплатно

    Family (2 акаунта)

    Споделете историите със семейството или приятелите си.

    11.24 € | 21.99 лв. /30 дни
    • 2 профила

    • Неограничен достъп

    • Потопете се заедно в света на историите

    • Слушайте и четете неограничено

    • Прекратете по всяко време

    Пробвайте 7 дни безплатно

    Family (3 акаунта)

    Споделете историите със семейството или приятелите си.

    13.29 € | 25.99 лв. /30 дни
    • 3 профила

    • Неограничен достъп

    • Потопете се заедно в света на историите

    • Слушайте и четете неограничено

    • Прекратете по всяко време

    Пробвайте 7 дни безплатно