Ouça e leia

Entre em um mundo infinito de histórias

  • Ler e ouvir tanto quanto você quiser
  • Com mais de 500.000 títulos
  • Títulos exclusivos + Storytel Originals
  • 7 dias de teste gratuito, depois R$19,90/mês
  • Fácil de cancelar a qualquer momento
Assine agora
br bdp devices

Ultimate Kali Linux Book, Second Edition: Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire

Duração
13H 47min
Idiomas
Inglês
Format
Categoria

Não-ficção

Kali Linux is the most well known and high level infiltration testing Linux conveyance inside the online protection industry. Utilizing Kali Linux, a network protection expert will actually want to find and take advantage of different weaknesses and perform progressed infiltration testing on both endeavor wired and remote organizations.

This book recording is a thorough aide for the people who are new to Kali Linux and entrance testing that will have you up to speed quickly. Utilizing genuine situations, you'll comprehend how to set up a lab and investigate center infiltration testing ideas. All through this book, you'll zero in on data assembling and even find different weakness appraisal apparatuses packaged in Kali Linux. You'll figure out how to find target frameworks on an organization, recognize security imperfections on gadgets, exploit security shortcomings and get to networks, set up Order and Control (C2) tasks, and perform web application infiltration testing. In this refreshed second version, you'll have the option to think twice about Catalog and take advantage of big business organizations. At long last, this book recording covers best practices for performing complex web entrance testing strategies in an exceptionally gotten climate.

Toward the finish of this Kali Linux book recording, you'll have acquired the abilities to perform progressed infiltration testing on big business networks utilizing Kali Linux.

© 2023 Gllen D. Singh Publishing, LLC. (Audiolivros): 9798368933948

Data de lançamento

Audiolivros: 19 de janeiro de 2023

Outros também usufruíram...

  1. HACKING: 3 BOOKS IN 1 Alex Wagner
  2. The Ultimate Kali Linux Book - Second Edition: Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire Glen D. Singh
  3. The Linux Command Line Beginner's Guide Jonathan Moeller
  4. Linux for Beginners: 3 BOOKS IN 1 ATTILA KOVACS
  5. Docker Essentials: Simplifying containerization : A Beginner's Guide Mike Wilson
  6. Linux for Beginners: 37 Linux Commands you Must Know ATTILA KOVACS
  7. Docker Decoded: Docker Programming Demystified: Step-by-Step Methods for Beginners Sarah Carter
  8. Navigating Docker: From Setup to Deployment: A Developer's Companion Ethan Calderwood
  9. Site Reliability Engineering: How Google Runs Production Systems Chris Jones
  10. Quick Start Kubernetes Nigel Poulton
  11. CompTIA A+ Certification Study Guide For 220-1102 Exam 2 Books In 1: Operating Systems, Software Troubleshooting, Security Awareness & Operational Procedures HISTORY FOREVER
  12. Computer Systems and Networking for Beginners: Comprehensive Guide to the Fundamentals of Technology and Connectivity James Ferry
  13. Computer Systems and Networking for Beginners: A Comprehensive Beginner's Guide to understanding Computer Systems, Networking Essentials, and the Foundations of Digital Connectivity Saimon Carrie
  14. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
  15. Security Chaos Engineering: Sustaining Resilience in Software and Systems Aaron Rinehart
  16. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
  17. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
  18. Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks. Hans Weber
  19. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  20. The Art of Deception: Controlling the Human Element of Security William L. Simon
  21. Coders: Who They Are, What They Think and How They Are Changing Our World Clive Thompson
  22. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  23. The Pentester BluePrint: Starting a Career as an Ethical Hacker Phillip L. Wylie
  24. Cybersecurity For Dummies Joseph Steinberg
  25. Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security Hans Weber
  26. Mastering Kubernetes: From Basics to Mastery: A Comprehensive Guide to Kubernetes Alice Morgan
  27. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
  28. Ethical Hacking Bible: Cybersecurity, Cryptography, Network Security, Wireless Technology and Wireless Hacking with Kali Linux | 7 books in 1 HUGO HOFFMAN
  29. The Clean Coder: A Code of Conduct for Professional Programmers Robert C. Martin
  30. Production Kubernetes: Building Successful Application Platforms John Harris
  31. Social Engineering: The Art of Human Hacking Christopher Hadnagy
  32. Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 HUGO HOFFMAN
  33. Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test Peter Bradley
  34. Hacking: How to Hack Alex Wagner
  35. Cybersecutity First Principles Rick Howard
  36. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
  37. Coders at Work: Reflections on the Craft of Programming Peter Seibel
  38. Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
  39. Cybercrime Investigators Handbook Graeme Edwards
  40. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple