Listen and read

Step into an infinite world of stories

  • Read and listen as much as you want
  • Over 950 000 titles
  • Exclusive titles + Storytel Originals
  • Easy to cancel anytime
Try now
image.devices-Singapore 2x

Penetration Testing Azure for Ethical Hackers: Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments

Language
English
Format
Category

Non-Fiction

Others also enjoyed ...

  1. An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments Kushantha Gunawardana
  2. The Vulnerability Researcher's Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities Benjamin Strout
  3. Security Orchestration, Automation, and Response for Security Analysts: Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture Benjamin Kovacevic
  4. TLS Cryptography In-Depth: Explore the intricacies of modern cryptography and the inner workings of TLS Dr. Paul Duplys
  5. Incident Response with Threat Intelligence: Practical insights into developing an incident response capability through intelligence-based threat hunting Roberto Martinez
  6. Practical Threat Detection Engineering: A hands-on guide to planning, developing, and validating detection capabilities Jason Deyalsingh
  7. Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide: Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and ebook. Lee Allen
  8. Combating Crime on the Dark Web: Learn how to access the dark web safely and not fall victim to cybercrime Nearchos Nearchou
  9. Implementing DevSecOps Practices: Supercharge your software security with DevSecOps excellence Vandana Verma Sehgal
  10. Adversarial AI Attacks, Mitigations, and Defense Strategies: A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps John Sotiropoulos