Wilson/Simpson/Antill's HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE, 4th edition, equips you with the knowledge and skills to protect networks using the tools and techniques of an ethical hacker. The authors explore the concept of ethical hacking and its practitioners -- explaining their importance in protecting corporate and government data -- and then deliver an in-depth guide to performing security testing. Thoroughly updated, the text covers new security resources, emerging vulnerabilities and innovative methods to protect networks, mobile security considerations, computer crime laws and…mehr
Wilson/Simpson/Antill's HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE, 4th edition, equips you with the knowledge and skills to protect networks using the tools and techniques of an ethical hacker. The authors explore the concept of ethical hacking and its practitioners -- explaining their importance in protecting corporate and government data -- and then deliver an in-depth guide to performing security testing. Thoroughly updated, the text covers new security resources, emerging vulnerabilities and innovative methods to protect networks, mobile security considerations, computer crime laws and penalties for illegal computer hacking. A final project brings concepts together in a penetration testing exercise and report, while virtual machine labs, auto-graded quizzes and interactive activities in the online learning platform help further prepare you for your role as a network security professional.
Robert S. Wilson is the cybersecurity curriculum coordinator and a cybersecurity instructor for Willis College (Canada's oldest career college). Rob created Willis College's Software Development and Cybersecurity Analyst (CSA) programs. Willis College's CSA program is currently being used by the Canadian Military to train cyber operator recruits. Rob has a computer science degree from the University of Waterloo, holds numerous certifications from CompTIA, Microsoft and Cisco, and has over 40 years of experience in the computing field. Rob has expertise in many areas including real time programming and embedded systems development (he worked for a company that has software on Mars), database development and administration, network and domain administration, penetration testing and cybersecurity.
Inhaltsangabe
Module 1. Ethical Hacking Overview.Module 2. TCP/IP Concepts Review.Module 3. Network and Computer Attacks.Module 4. Footprinting and Social Engineering.Module 5. Port Scanning.Module 7. Programming for Security Professionals.Module 8. Desktop and Server OS Vulnerabilities.Module 9. Embedded Operating Systems: The Hidden Threat.Module 10. Hacking Web Applications.Module 11. Hacking Wireless Networks.Module 12. Cryptography.Module 13. Network Protection Systems.Module 14. The Final Project.Appendix A. Legal Resources.Appendix B. Resources.
Module 1. Ethical Hacking Overview.Module 2. TCP/IP Concepts Review.Module 3. Network and Computer Attacks.Module 4. Footprinting and Social Engineering.Module 5. Port Scanning.Module 7. Programming for Security Professionals.Module 8. Desktop and Server OS Vulnerabilities.Module 9. Embedded Operating Systems: The Hidden Threat.Module 10. Hacking Web Applications.Module 11. Hacking Wireless Networks.Module 12. Cryptography.Module 13. Network Protection Systems.Module 14. The Final Project.Appendix A. Legal Resources.Appendix B. Resources.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826