All ~200k movies are available for free
No upgrade needed

Packt - Ethical Hacking Workshop: Explore a Practical Approach to Learning and Applying Ethical Hacking Techniques for Effective Cybersecurity - Rishalin Pillay, Mohammed Abutheraa

added

Title: Ethical Hacking Workshop: Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity Paperback
Authors: Rishalin Pillay (Author), Mohammed Abutheraa (Author)
Release Date: Oct 2023
Length: 220 pages
Edition: 1st Edition

Get a hands-on training and experience in tools, techniques, and best practices for effective ethical hacking to combat cyber threats at any scale.

Book Description:

The Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools.

By exploring the thought process involved in ethical hacking and the various techniques you can use to obtain results, you'll gain a deep understanding of how to leverage these skills effectively.

Throughout this book, you'll learn how to conduct a successful ethical hack, how to use the tools correctly, and how to interpret the results to enhance your environment's security. Hands-on exercises at the end of each chapter will ensure that you solidify what you&ve learnt and get experience with the tools.

By the end of the book, you'll be well-versed in ethical hacking and equipped with the skills and knowledge necessary to safeguard your enterprise against cyber-attacks.

What you will learn:

- Understand the key differences between encryption algorithms, hashing algorithms, and cryptography standards.

- Capture and analyze network traffic.

- Get to grips with the best practices for performing in-cloud recon.

- Get start with performing scanning techniques and network mapping.

- Leverage various top tools to perform privilege escalation, lateral movement, and implant backdoors.

- Find out how to clear tracks and evade detection.

Who this book is for:

This book is for cybersecurity professionals who already work as part of a security team, blue team, purple team or as a security analyst and want to become familiar with the same skills and tools that potential attackers may use to breach your system and identify security vulnerabilities. A solid understanding of cloud computing and networking is a prerequisite.