Ethical Hacking Workshop
eBook - ePub

Ethical Hacking Workshop

Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity

  1. 220 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Ethical Hacking Workshop

Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity

About this book

Get a hands-on training and experience in tools, techniques, and best practices for effective ethical hacking to combat cyber threats at any scale

Key Features

  • Use the ethical hacking methodology and thought process to perform a successful ethical hack
  • Explore the various stages of an ethical hack and the tools related to each phase
  • Purchase of the print or Kindle book includes a free PDF eBook

Book Description

The Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools.By exploring the thought process involved in ethical hacking and the various techniques you can use to obtain results, you'll gain a deep understanding of how to leverage these skills effectively.Throughout this book, you'll learn how to conduct a successful ethical hack, how to use the tools correctly, and how to interpret the results to enhance your environment's security. Hands-on exercises at the end of each chapter will ensure that you solidify what you've learnt and get experience with the tools.By the end of the book, you'll be well-versed in ethical hacking and equipped with the skills and knowledge necessary to safeguard your enterprise against cyber-attacks.

What you will learn

  • Understand the key differences between encryption algorithms, hashing algorithms, and cryptography standards
  • Capture and analyze network traffic
  • Get to grips with the best practices for performing in-cloud recon
  • Get start with performing scanning techniques and network mapping
  • Leverage various top tools to perform privilege escalation, lateral movement, and implant backdoors
  • Find out how to clear tracks and evade detection

Who this book is for

This book is for cybersecurity professionals who already work as part of a security team, blue team, purple team or as a security analyst and want to become familiar with the same skills and tools that potential attackers may use to breach your system and identify security vulnerabilities. A solid understanding of cloud computing and networking is a prerequisite.

]]>

Tools to learn more effectively

Saving Books

Saving Books

Keyword Search

Keyword Search

Annotating Text

Annotating Text

Listen to it instead

Listen to it instead

Table of contents

  1. Ethical Hacking Workshop
  2. Contributors
  3. Preface
  4. Part 1:Network Fundamentals
  5. 1
  6. 2
  7. 3
  8. Part 2: Breaking and Entering
  9. 4
  10. 5
  11. 6
  12. Part 3: Total Immersion
  13. 7
  14. Index
  15. Other Books You May Enjoy

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn how to download books offline
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 990+ topics, we’ve got you covered! Learn about our mission
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more about Read Aloud
Yes! You can use the Perlego app on both iOS and Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app
Yes, you can access Ethical Hacking Workshop by Rishalin Pillay,Mohammed Abutheraa in PDF and/or ePUB format, as well as other popular books in Computer Science & Cyber Security. We have over one million books available in our catalogue for you to explore.