오디오북 라이프의 시작

격이 다른 오디오북 생활을 경험해보세요!

  • 언제든 손쉽게 구독해지 가능
  • 월정액 11900원 부터
  • 무제한 청취
  • 총 5만권 이상의 영/한 오디오북
  • 온가족을 위한 다양한 오디오북
지금 바로 시작해보세요!
kr all devices

Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition

언어
영어
Format
카테고리

논픽션

Learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it

About This Book • Explore and build intricate architectures that allow you to emulate an enterprise network

• Test and enhance your security skills against complex and hardened virtual architecture

• Learn methods to bypass common enterprise defenses and leverage them to test the most secure environments.

Who This Book Is For

While the book targets advanced penetration testing, the process is systematic and as such will provide even beginners with a solid methodology and approach to testing.

You are expected to have network and security knowledge. The book is intended for anyone who wants to build and enhance their existing professional security and penetration testing methods and skills.

What You Will Learn • Learning proven security testing and penetration testing techniques

• Building multi-layered complex architectures to test the latest network designs

• Applying a professional testing methodology

• Determining whether there are filters between you and the target and how to penetrate them

• Deploying and finding weaknesses in common firewall architectures.

• Learning advanced techniques to deploy against hardened environments

• Learning methods to circumvent endpoint protection controls

In Detail

Security flaws and new hacking techniques emerge overnight – security professionals need to make sure they always have a way to keep . With this practical guide, learn how to build your own virtual pentesting lab environments to practice and develop your security skills. Create challenging environments to test your abilities, and overcome them with proven processes and methodologies used by global penetration testing teams.

Get to grips with the techniques needed to build complete virtual machines perfect for pentest training. Construct and attack layered architectures, and plan specific attacks based on the platforms you're going up against. Find new vulnerabilities for different kinds of systems and networks, and what these mean for your clients.

Driven by a proven penetration testing methodology that has trained thousands of testers, Building Virtual Labs for Advanced Penetration Testing, Second Edition will prepare you for participation in professional security teams.

Style and approach

The book is written in an easy-to-follow format that provides a step–by-step, process-centric approach. Additionally, there are numerous hands-on examples and additional references for readers who might want to learn even more. The process developed throughout the book has been used to train and build teams all around the world as professional security and penetration testers.

© 2016 Packt Publishing (전자책 ): 9781785884955

출시일

전자책 : 2016년 8월 30일

태그

    다른 사람들도 즐겼습니다 ...

    1. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
    2. Cybersecurity For Dummies Joseph Steinberg
    3. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
    4. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
    5. Social Engineering: The Art of Human Hacking Christopher Hadnagy
    6. Hacking API: Navigating the Intricacies of API Security and Ethical Hacking James Ferry
    7. Project Zero Trust: A Story about a Strategy for Aligning Security and the Business George Finney
    8. Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career Dr. Gerald Auger
    9. Terraform By Example: A Practical Approach for Beginners to Learn Cloud Infrastructure with Terraform Luca Berton
    10. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
    11. Schneier on Security Bruce Schneier
    12. Cybersecurity for Beginners: How to Defend Against Hackers & Malware ATTILA KOVACS
    13. Security Chaos Engineering: Sustaining Resilience in Software and Systems Aaron Rinehart
    14. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
    15. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
    16. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
    17. The Pentester BluePrint: Starting a Career as an Ethical Hacker Phillip L. Wylie
    18. Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks. Hans Weber
    19. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
    20. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
    21. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
    22. Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
    23. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
    24. A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Bruce Schneier
    25. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
    26. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
    27. Ethical Hacking Bible: Cybersecurity, Cryptography, Network Security, Wireless Technology and Wireless Hacking with Kali Linux | 7 books in 1 HUGO HOFFMAN
    28. Hackable: How to Do Application Security Right Ted Harrington
    29. Computational Thinking Peter J. Denning
    30. Targeted: My Inside Story of Cambridge Analytica and How Trump, Brexit and Facebook Broke Democracy Brittany Kaiser

    언제 어디서나 스토리텔

    • 국내 유일 해리포터 시리즈 오디오북

    • 5만권이상의 영어/한국어 오디오북

    • 키즈 모드(어린이 안전 환경)

    • 월정액 무제한 청취

    • 언제든 취소 및 해지 가능

    • 오프라인 액세스를 위한 도서 다운로드

    인기

    스토리텔 언리미티드

    5만권 이상의 영어, 한국어 오디오북을 무제한 들어보세요

    11900 원 /월
    • 계정 1개

    • 무제한 청취

    • 사용자 1인

    • 무제한 청취

    • 언제든 해지하실 수 있어요

    지금 바로 시작하기

    패밀리

    친구 또는 가족과 함께 오디오북을 즐기고 싶은 분들을 위해

    매달 17900원 부터
    • 2-3 계정

    • 무제한 청취

    • 2-3 계정

    • 무제한 청취

    • 언제든 해지하실 수 있어요

    2 개 계정

    17900 원 /월
    지금 바로 시작하기