Kuuntele missä ja milloin haluat

Astu tarinoiden maailmaan

  • Pohjoismaiden suosituin ääni- ja e-kirjapalvelu
  • Uppoudu suureen valikoimaan äänikirjoja, e-kirjoja ja podcasteja
  • Storytel Original -sisältöjä yksinoikeudella
  • Ei sitoutumisaikaa
Lunasta tarjous
NO - Details page - Device banner - 894x1036

Ultimate Penetration Testing with Nmap

Kieli
Englanti
Format
Kategoria

Tietokirjallisuus

Master one of the most essential tools a professional pen tester needs to know.

Book Description This essential handbook offers a systematic journey through the intricacies of Nmap, providing both novice and seasoned professionals with the tools and techniques needed to conduct thorough security assessments with confidence. The purpose of this book is to educate and empower cyber security professionals to increase their skill set, and by extension, contribute positively to the cyber security posture of organizations through the use of Nmap.

This book starts at the ground floor by establishing a baseline understanding of what Penetration Testing is, how it is similar but distinct from other types of security engagements, and just how powerful of a tool Nmap can be to include in a pen tester’s arsenal. By systematically building the reader's proficiency through thought-provoking case studies, guided hands-on challenges, and robust discussions about how and why to employ different techniques, the reader will finish each chapter with new tangible skills.

With practical best practices and considerations, you'll learn how to optimize your Nmap scans while minimizing risks and false positives.

Table of Contents 1. Introduction to Nmap and Security Assessments 2. Setting Up a Lab Environment For Nmap 3. Introduction to Attack Surface Mapping 4. Identifying Vulnerabilities Through Reconnaissance and Enumeration 5. Mapping a Large Environment 6. Leveraging Zenmap and Legion 7. Advanced Obfuscation and Firewall Evasion Techniques 8. Leveraging the Nmap Scripting Engine 9. Best Practices and Considerations APPENDIX A. Additional Questions APPENDIX B. Nmap Quick Reference Guide Index

© 2024 Orange Education Pvt Ltd (E-kirja): 9788197081880

Julkaisupäivä

E-kirja: 31. maaliskuuta 2024

Saattaisit pitää myös näistä

  1. Infrastructure Attack Strategies for Ethical Hacking Himanshu Sharma
  2. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
  3. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
  4. Ethical Hacking: A Beginner’s Guide to Cybersecurity Mastery: Learn Skills to Protect Against Cyber Threats Effectively Nora Simmons
  5. Cybercrime and the Darknet: Revealing the hidden underworld of the internet Cath Senker
  6. Secure Edge Computing for IoT Oluyemi Odeyinka
  7. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
  8. Defensive Security Handbook: Best Practices for Securing Infrastructure (2nd Edition) Amanda Berlin
  9. The Art of Deception: Controlling the Human Element of Security William L. Simon
  10. Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing Roger A. Grimes
  11. CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) Andrew Hutz
  12. CompTIA Network+: 3 in 1- Beginner's Guide+ Tips and Tricks+ Simple and Effective Strategies to Learn About CompTIA Network+ Certification Walker Schmidt
  13. Hacking API: Navigating the Intricacies of API Security and Ethical Hacking James Ferry
  14. The DevSecOps Playbook: Deliver Continuous Security at Speed Sean D. Mack
  15. Cybersecutity First Principles Rick Howard
  16. Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
  17. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
  18. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
  19. Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology Diana Graber
  20. Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
  21. Cybersecurity for Beginners: Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide Kevin Clark
  22. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
  23. A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Bruce Schneier
  24. Social Engineering: The Art of Human Hacking Christopher Hadnagy
  25. Cyber Security: Beginners’ Guide to Hacking, Phishing, Social Engineering, and Malware Jonathan Rigdon
  26. The Software Developer's Career Handbook: A Guide to Navigating the Unpredictable Michael Lopp
  27. Cybersecurity For Dummies Joseph Steinberg
  28. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  29. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
  30. The New Age of Sexism: How the AI Revolution is Reinventing Misogyny Laura Bates
  31. Life on the Edge - The Coming of Age of Quantum Biology Johnjoe McFadden
  32. Hacking: How to Hack Alex Wagner
  33. Ultimate Cyberwarfare for Evasive Cyber Tactics Chang Tan
  34. Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST ATTILA KOVACS
  35. Ultimate Kali Linux Book, Second Edition: Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire Gllen D. Singh
  36. Docker Unboxed: Mastering Modern Infrastructure with Container Technology Sophia Bell
  37. Docker Essentials: Simplifying containerization : A Beginner's Guide Mike Wilson
  38. Security Chaos Engineering: Sustaining Resilience in Software and Systems Aaron Rinehart
  39. Spying Blind: The CIA, the FBI, and the Origins of 9/11 Amy B. Zegart
  40. CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition Mike Chapple
  41. Linux for Beginners: How to Perform Linux Admin Tasks ATTILA KOVACS
  42. Advanced Analytics with Power BI and Excel Dejan Sarka
  43. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III

Valitse tilausmalli

  • Yli miljoona tarinaa

  • Suosituksia juuri sinulle

  • Uusia Storytel Originals + eksklusiivisia sisältöjä kuukausittain

  • Turvallinen Kids Mode

  • Ei sitoutumisaikaa

Standard

Sinulle joka kuuntelet säännöllisesti.

16.99 € /kuukausi
  • 1 käyttäjätili

  • 50 tuntia/kuukausi

  • Ei sitoutumisaikaa

Kokeile 60 päivää ilmaiseksi
Suosituin

Premium

Sinulle joka kuuntelet ja luet usein.

19.99 € /kuukausi
  • 1 käyttäjätili

  • 100 tuntia/kuukausi

  • Ei sitoutumisaikaa

Lunasta tarjous

Unlimited

Sinulle joka haluat rajattomasti tarinoita.

24.99 € /kuukausi
  • 1 käyttäjätili

  • Kuuntele ja lue rajattomasti

  • Ei sitoutumisaikaa

Kokeile 7 päivää ilmaiseksi

Family

Kun haluat jakaa tarinoita perheen kanssa.

Alkaen 26.99 €/kuukausi
  • 2-6 tiliä

  • 100 tuntia/kk jokaiselle käyttäjälle

  • Ei sitoutumisaikaa

2 käyttäjätiliä

26.99 € /kuukausi
Kokeile 7 päivää ilmaiseksi

Flex

Sinulle joka kuuntelet vähemmän.

9.99 € /kuukausi
  • 1 käyttäjätili

  • 20 tuntia/kuukausi

  • Säästä käyttämättömät tunnit, max 20h

  • Ei sitoutumisaikaa

Kokeile 7 päivää ilmaiseksi