Page de couverture de Hacking: A Concise Guide To Ethical Hacking - Everything You Need To Know! (Penetration Testing)

Hacking: A Concise Guide To Ethical Hacking - Everything You Need To Know! (Penetration Testing)

Aperçu

Essayer pour 0,00 $
Choisissez 1 livre audio par mois dans notre incomparable catalogue.
Écoutez à volonté des milliers de livres audio, de livres originaux et de balados.
L'abonnement Premium Plus se renouvelle automatiquement au tarif de 14,95 $/mois + taxes applicables après 30 jours. Annulation possible à tout moment.

Hacking: A Concise Guide To Ethical Hacking - Everything You Need To Know! (Penetration Testing)

Auteur(s): Gary Mitnick
Narrateur(s): Sean Tivenan
Essayer pour 0,00 $

14,95$ par mois après 30 jours. Annulable en tout temps.

Acheter pour 8,71 $

Acheter pour 8,71 $

Confirmer l'achat
Payer avec la carte finissant par
En confirmant votre achat, vous acceptez les conditions d'utilisation d'Audible et la déclaration de confidentialité d'Amazon. Des taxes peuvent s'appliquer.
Annuler

À propos de cet audio

Everything you need to know about ethical hacking.

Learn all the major hacking techniques today and how they work. By the time, you finish this book you will have strong knowledge of what a professional ethical hacker goes through. You will also be able to put these practices into action. There are five phases to penetration testing. These are important steps for any hacker to perform in order to successfully gain and maintain access. Properly performing the steps outlined in Hacking: A Concise Guide To Ethical Hacking, Everything You Need To Know can make the difference between a successful penetration or an unsuccessful one. Passive and active footprinting are discussed in detail and you will soon have some excellent footprinting tools available to you to use to complete the footprint.

Malware, Trojans, Viruses and worms are often specifically designed to gain access or damage systems without the knowledge of the victim. You will also learn about social engineering techniques, why they are so effective and get the social engineering toolkit to perform the job. Once the homework for the attack is complete the next step covered is the implementation of system hacking. Gain access with various password attacks, exploit weaknesses, get higher privileges and discover the tools that are used to hide a successful intrusion.

©2017 Gary Mitnick (P)2017 Gary Mitnick
Informatique Programmation et développement de logiciels
activate_Holiday_promo_in_buybox_DT_T2

Ce que les auditeurs disent de Hacking: A Concise Guide To Ethical Hacking - Everything You Need To Know! (Penetration Testing)

Moyenne des évaluations de clients

Évaluations – Cliquez sur les onglets pour changer la source des évaluations.