Помощь
Добавить в избранное
Музыка Dj Mixes Альбомы Видеоклипы Топ Радио Радиостанции Видео приколы Flash-игры
Музыка пользователей Моя музыка Личный кабинет Моя страница Поиск Пользователи Форум Форум

   Сообщения за день
Вернуться   Bisound.com - Музыкальный портал > Программы, музыкальный soft

Ответ
 
Опции темы
  #1  
Старый 17.07.2025, 00:31
hopaxom869@amxyy.com hopaxom869@amxyy.com вне форума
Живу я здесь
 
Регистрация: 25.08.2024
Сообщений: 21,276
По умолчанию The Art Of Network Penetration Testing, Video Edition


The Art Of Network Penetration Testing, Video Edition
Published: 12/2020
Duration: 7h 57m | Video: .MP4, 1920x1080 30 fps | Audio: AAC, 44.1kHz, 2ch | Size: 1.21 GB
Genre: eLearning | Language: English


In Video Editions the narrator reads the book while the content, figures, code listings, diagrams, and text appear on the screen. Like an audiobook that you can also watch as a video.
Penetration testing is about more than just getting through a perimeter firewall. The biggest security threats are inside the network, where attackers can rampage through sensitive data by exploiting weak access controls and poorly patched software. Designed for up-and-coming security professionals, The Art of Network Penetration Testing teaches you how to take over an enterprise network from the inside. It lays out every stage of an internal security assessment step-by-step, showing you how to identify weaknesses before a malicious invader can do real damage.
About the Technology
Penetration testers uncover security gaps by attacking networks exactly like malicious intruders do. To become a world-class pentester, you need to master offensive security concepts, leverage a proven methodology, and practice, practice, practice. Th is book delivers insights from security expert Royce Davis, along with a virtual testing environment you can use to hone your skills.
About the Book
The Art of Network Penetration Testing is a guide to simulating an internal security breach. You'll take on the role of the attacker and work through every stage of a professional pentest, from information gathering to seizing control of a system and owning the network. As you brute force passwords, exploit unpatched services, and elevate network level privileges, you'll learn where the weaknesses are-and how to take advantage of them.
What's Inside
Set up a virtual pentest lab
Exploit Windows and Linux network vulnerabilities
Establish persistent re-entry to compromised targets
Detail your findings in an engagement report


Ответить с цитированием
Ответ



Ваши права в разделе
Вы не можете создавать темы
Вы не можете отвечать на сообщения
Вы не можете прикреплять файлы
Вы не можете редактировать сообщения

BB коды Вкл.
Смайлы Вкл.
[IMG] код Вкл.
HTML код Выкл.
Быстрый переход


Музыка Dj mixes Альбомы Видеоклипы Каталог файлов Радио Видео приколы Flash-игры
Все права защищены © 2007-2025 Bisound.com Rambler's Top100