Hands-On Ethical Hacking Tactics: Strategies, tools, and techniques for effective cyber defense

Detect and mitigate diverse cyber threats with actionable insights into attacker types, techniques, and efficient cyber threat...
$150.95 AUD
$150.95 AUD
SKU: 9781801810081
Product Type: Books
Please hurry! Only 435 left in stock
Author: Shane Hartman
Format: Paperback
Language: English
Subtotal: $150.95
10 customers are viewing this product
Hands-On Ethical Hacking Tactics: Strategies, tools, and techniques for effective cyber defense by Hartman, Shane

Hands-On Ethical Hacking Tactics: Strategies, tools, and techniques for effective cyber defense

$150.95

Hands-On Ethical Hacking Tactics: Strategies, tools, and techniques for effective cyber defense

$150.95
Author: Shane Hartman
Format: Paperback
Language: English

Detect and mitigate diverse cyber threats with actionable insights into attacker types, techniques, and efficient cyber threat hunting

Key Features
  • Explore essential tools and techniques to ethically penetrate and safeguard digital environments
  • Set up a malware lab and learn how to detect malicious code running on the network
  • Understand different attacker types, their profiles, and mindset, to enhance your cyber defense plan
  • Purchase of the print or Kindle book includes a free PDF eBook
Book Description

If you're an ethical hacker looking to boost your digital defenses and stay up to date with the evolving cybersecurity landscape, then this book is for you. Hands-On Ethical Hacking Tactics is a comprehensive guide that will take you from fundamental to advanced levels of ethical hacking, offering insights into both offensive and defensive techniques. Written by a seasoned professional with 20+ years of experience, this book covers attack tools, methodologies, and procedures, helping you enhance your skills in securing and defending networks.

The book starts with foundational concepts such as footprinting, reconnaissance, scanning, enumeration, vulnerability assessment, and threat modeling. Next, you'll progress to using specific tools and procedures for hacking Windows, Unix, web servers, applications, and databases. The book also gets you up to speed with malware analysis. Throughout the book, you'll experience a smooth transition from theoretical concepts to hands-on techniques using various platforms. Finally, you'll explore incident response, threat hunting, social engineering, IoT hacking, and cloud exploitation, which will help you address the complex aspects of ethical hacking.

By the end of this book, you'll have gained the skills you need to navigate the ever-changing world of cybersecurity.

What you will learn
  • Understand the core concepts and principles of ethical hacking
  • Gain hands-on experience through dedicated labs
  • Explore how attackers leverage computer systems in the digital landscape
  • Discover essential defensive technologies to detect and mitigate cyber threats
  • Master the use of scanning and enumeration tools
  • Understand how to hunt and use search information to identify attacks
Who this book is for

Hands-On Ethical Hacking Tactics is for penetration testers, ethical hackers, and cybersecurity enthusiasts looking to explore attack tools, methodologies, and procedures relevant to today's cybersecurity landscape. This ethical hacking book is suitable for a broad audience with varying levels of expertise in cybersecurity, whether you're a student or a professional looking for job opportunities, or just someone curious about the field.

Table of Contents
  1. Ethical Hacking Concepts
  2. Ethical Hacking Footprinting and Reconnaissance
  3. Ethical Hacking Scanning and Enumeration
  4. Ethical Hacking Vulnerability Assessment and Threat Modeling
  5. Hacking the Windows Operating System
  6. Hacking the Linux Operating System
  7. Ethical Hacking of Web Servers
  8. Hacking Databases
  9. Ethical Hacking Protocol Review
  10. Ethical Hacking for Malware Analysis
  11. Incident Response and Threat Hunting
  12. Social Engineering
  13. Ethical Hacking of the Internet of Things (IoT)
  14. Ethical Hacking in the Cloud


Author: Shane Hartman
Publisher: Packt Publishing
Published: 05/17/2024
Pages: 464
Binding Type: Paperback
Weight: 1.74lbs
Size: 9.25h x 7.50w x 0.94d
ISBN: 9781801810081

This title is not returnable

Returns Policy

You may return most new, unopened items within 30 days of delivery for a full refund. We'll also pay the return shipping costs if the return is a result of our error (you received an incorrect or defective item, etc.).

You should expect to receive your refund within four weeks of giving your package to the return shipper, however, in many cases you will receive a refund more quickly. This time period includes the transit time for us to receive your return from the shipper (5 to 10 business days), the time it takes us to process your return once we receive it (3 to 5 business days), and the time it takes your bank to process our refund request (5 to 10 business days).

If you need to return an item, simply login to your account, view the order using the "Complete Orders" link under the My Account menu and click the Return Item(s) button. We'll notify you via e-mail of your refund once we've received and processed the returned item.

Shipping

We can ship to virtually any address in the world. Note that there are restrictions on some products, and some products cannot be shipped to international destinations.

When you place an order, we will estimate shipping and delivery dates for you based on the availability of your items and the shipping options you choose. Depending on the shipping provider you choose, shipping date estimates may appear on the shipping quotes page.

Please also note that the shipping rates for many items we sell are weight-based. The weight of any such item can be found on its detail page. To reflect the policies of the shipping companies we use, all weights will be rounded up to the next full pound.

Related Products

Recently Viewed Products