Słuchaj 50% taniej przez 4 miesiące

Świat setek tysięcy audiobooków i e-booków czeka na Ciebie - teraz za jedyne 19,95 zł miesięcznie przez pierwsze 4 miesiące.

  • Czytaj i słuchaj jak chcesz i ile chcesz
  • Ponad 500 000 tytułów
  • Tytuły dostępne wyłącznie w Storytel oraz Storytel Originals
  • 7-dniowy bezpłatny okres próbny
  • Łatwa rezygnacja w dowolnym momencie
Skorzystaj ze zniżki
PL - Details page - Device banner - 894x1036

Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST

3 Ocena

2.3

Czas
3H 4min
Język
angielski
Format
Kategoria

Literatura Faktu

- Do you want learn how to build a PenTest Lab but you don't know where to start?

- Do you want a practical audiobook that explains step-by-step how to get going?

If the answer is yes to the above questions, this audiobook is for you!

Frequently Asked Questions

-Question: I am new to IT, and I don't have any experience in the field of Hacking, should I get this audiobook?

-Answer: This audiobook is designed to those interested in Penetration Testing aka Ethical Hacking, and having limited, or no experience in the realm of Cybersecurity.

BUY THIS AUDIOBOOK NOW, AND GET STARTED TODAY!

IN THIS AUDIOBOOK YOU WILL LEARN: -What are the Frameworks of Penetration Testing -What Scanning Tools you should be Aware -What Credential Testing Tools you must Utilize -What Debugging & Software Assurance Tools are Available -Introduction to OSINT & Wireless Tools -What is a Web Proxy, SET & RDP -What Mobile Tools you should be familiar with -How to Setup a Lab in NPE -How to Setup Hyper-V on Windows 10 -How to Setup VMware on Windows 10 -How to Assemble the Required Resources -How to Install Windows Server in VMware -How to Configure Windows Server in VMware -How to Install Windows Server in Hyper-V -How to Configure Windows Server in Hyper-V -How to Install & Configure OWASP-BWA in VMware -How to Install & Configure Metasploitable in VMware -How to Install Kali Linux in VMware -How to Install BlackArch in Hyper-V -What Software & Hardware you must have as a PenTester -What are the Rules of Engagement -What are the Best Practices before Going Live

© 2020 ATTILA KOVACS (Audiobook): 9781094209616

Data wydania

Audiobook: 11 marca 2020

Inni polubili także ...

  1. Networking For Dummies (11th Edition): 11th Edition Doug Lowe
  2. Ethical Hacking Introbooks Team
  3. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
  4. Cybersecurity and Cyberwar: What Everyone Needs to Know Allan Friedman
  5. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
  6. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
  7. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  8. Cybersecurity For Dummies Joseph Steinberg
  9. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
  10. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
  11. Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
  12. Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks. Hans Weber
  13. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  14. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
  15. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
  16. Coders: Who They Are, What They Think and How They Are Changing Our World Clive Thompson
  17. Social Engineering: The Art of Human Hacking Christopher Hadnagy
  18. The Pentester BluePrint: Starting a Career as an Ethical Hacker Phillip L. Wylie
  19. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Bruce Schneier
  20. The Art of Deception: Controlling the Human Element of Security William L. Simon
  21. Cybercrime and the Darknet: Revealing the hidden underworld of the internet Cath Senker
  22. Blockchain For Dummies Tiana Laurence
  23. Cloud Security For Dummies Ted Coombs
  24. Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security Hans Weber
  25. We Have Root: Even More Advice from Schneier on Security Bruce Schneier
  26. Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Eric Cole
  27. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
  28. Biggest Cyber Crimes in the History Introbooks Team
  29. HACKING: 3 BOOKS IN 1 Alex Wagner
  30. Linux for Beginners: How to Perform Linux Admin Tasks ATTILA KOVACS
  31. Linux for Beginners: 3 BOOKS IN 1 ATTILA KOVACS
  32. What is the Dark Web?: The truth about the hidden part of the internet Evan J. Rodgers
  33. Permanent Record: A Memoir of a Reluctant Whistleblower Edward Snowden
  34. Data Science John D. Kelleher
  35. Business Intelligence For Dummies Swain Scheps
  36. Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test Peter Bradley
  37. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
  38. Computational Thinking Peter J. Denning
  39. Cyber Hacking: Wars in Virtual Space Scientific American
  40. Pegasus: The Story of the World's Most Dangerous Spyware Laurent Richard
  41. Hacking: How to Hack Alex Wagner
  42. Ethical Hacking Bible: Cybersecurity, Cryptography, Network Security, Wireless Technology and Wireless Hacking with Kali Linux | 7 books in 1 HUGO HOFFMAN
  43. Becoming a Fashion Designer Lindsay Peoples Wagner
  44. Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 HUGO HOFFMAN
  45. Once Upon an Algorithm: How Stories Explain Computing Martin Erwig

Wybierz swoją subskrypcję:

  • Ponad 500 000 tytułów w cenie jednego abonamentu

  • Słuchaj i czytaj w trybie offline

  • Ekskluzywne produkcje audio Storytel Original

  • Tryb dziecięcy Kids Mode

  • Anuluj kiedy chcesz

Najpopularniejsze
50% taniej przez 4 miesiące

Unlimited

Dla tych, którzy chcą słuchać i czytać bez limitów.

39.90 zł /miesiąc
  • 1 konto

  • Nielimitowany Dostęp

  • 1 konto

  • Słuchanie bez limitów

  • Anuluj w dowolnym momencie

Skorzystaj z promocji

Unlimited na rok

Dla tych, którzy chcą słuchać i czytać bez limitów.

39.90 zł /miesiąc
  • 1 konto

  • Nielimitowany Dostęp

  • 1 konto

  • Słuchanie bez limitów

  • Anuluj w dowolnym momencie

Rozpocznij subskrypcję

Basic

Dla tych, którzy słuchają i czytają od czasu do czasu.

22.90 zł /miesiąc
7 dni za darmo
  • 1 konto

  • 10 godzin/miesięcznie

  • 1 konto

  • 10 godzin / miesiąc

  • Anuluj w dowolnym momencie

Wypróbuj

Family

Dla tych, którzy chcą dzielić się historiami ze znajomymi i rodziną.

Od 59.90 zł/miesiąc
7 dni za darmo
  • 2-3 kont

  • Nielimitowany Dostęp

  • 2–3 konta

  • Słuchanie bez limitów

  • Anuluj w dowolnym momencie

2 konta

59.90 zł /miesiąc
Wypróbuj