Dekorationsartikel gehören nicht zum Leistungsumfang.
Sprache:
Englisch
44,55 €*
Versandkostenfrei per Post / DHL
Lieferzeit 1-2 Wochen
Kategorien:
Beschreibung
Master one of the most essential tools a professional pen tester needs to know.
Book Description
This essential handbook offers a systematic journey through the intricacies of Nmap, providing both novice and seasoned professionals with the tools and techniques needed to conduct thorough security assessments with confidence. The purpose of this book is to educate and empower cyber security professionals to increase their skill set, and by extension, contribute positively to the cyber security posture of organizations through the use of Nmap.
This book starts at the ground floor by establishing a baseline understanding of what Penetration Testing is, how it is similar but distinct from other types of security engagements, and just how powerful of a tool Nmap can be to include in a pen tester's arsenal. By systematically building the reader's proficiency through thought-provoking case studies, guided hands-on challenges, and robust discussions about how and why to employ different techniques, the reader will finish each chapter with new tangible skills.
With practical best practices and considerations, you'll learn how to optimize your Nmap scans while minimizing risks and false positives.
Table of Contents
1. Introduction to Nmap and Security Assessments
2. Setting Up a Lab Environment For Nmap
3. Introduction to Attack Surface Mapping
4. Identifying Vulnerabilities Through Reconnaissance and Enumeration
5. Mapping a Large Environment
6. Leveraging Zenmap and Legion
7. Advanced Obfuscation and Firewall Evasion Techniques
8. Leveraging the Nmap Scripting Engine
9. Best Practices and Considerations
APPENDIX A. Additional Questions
APPENDIX B. Nmap Quick Reference Guide
Index
Book Description
This essential handbook offers a systematic journey through the intricacies of Nmap, providing both novice and seasoned professionals with the tools and techniques needed to conduct thorough security assessments with confidence. The purpose of this book is to educate and empower cyber security professionals to increase their skill set, and by extension, contribute positively to the cyber security posture of organizations through the use of Nmap.
This book starts at the ground floor by establishing a baseline understanding of what Penetration Testing is, how it is similar but distinct from other types of security engagements, and just how powerful of a tool Nmap can be to include in a pen tester's arsenal. By systematically building the reader's proficiency through thought-provoking case studies, guided hands-on challenges, and robust discussions about how and why to employ different techniques, the reader will finish each chapter with new tangible skills.
With practical best practices and considerations, you'll learn how to optimize your Nmap scans while minimizing risks and false positives.
Table of Contents
1. Introduction to Nmap and Security Assessments
2. Setting Up a Lab Environment For Nmap
3. Introduction to Attack Surface Mapping
4. Identifying Vulnerabilities Through Reconnaissance and Enumeration
5. Mapping a Large Environment
6. Leveraging Zenmap and Legion
7. Advanced Obfuscation and Firewall Evasion Techniques
8. Leveraging the Nmap Scripting Engine
9. Best Practices and Considerations
APPENDIX A. Additional Questions
APPENDIX B. Nmap Quick Reference Guide
Index
Master one of the most essential tools a professional pen tester needs to know.
Book Description
This essential handbook offers a systematic journey through the intricacies of Nmap, providing both novice and seasoned professionals with the tools and techniques needed to conduct thorough security assessments with confidence. The purpose of this book is to educate and empower cyber security professionals to increase their skill set, and by extension, contribute positively to the cyber security posture of organizations through the use of Nmap.
This book starts at the ground floor by establishing a baseline understanding of what Penetration Testing is, how it is similar but distinct from other types of security engagements, and just how powerful of a tool Nmap can be to include in a pen tester's arsenal. By systematically building the reader's proficiency through thought-provoking case studies, guided hands-on challenges, and robust discussions about how and why to employ different techniques, the reader will finish each chapter with new tangible skills.
With practical best practices and considerations, you'll learn how to optimize your Nmap scans while minimizing risks and false positives.
Table of Contents
1. Introduction to Nmap and Security Assessments
2. Setting Up a Lab Environment For Nmap
3. Introduction to Attack Surface Mapping
4. Identifying Vulnerabilities Through Reconnaissance and Enumeration
5. Mapping a Large Environment
6. Leveraging Zenmap and Legion
7. Advanced Obfuscation and Firewall Evasion Techniques
8. Leveraging the Nmap Scripting Engine
9. Best Practices and Considerations
APPENDIX A. Additional Questions
APPENDIX B. Nmap Quick Reference Guide
Index
Book Description
This essential handbook offers a systematic journey through the intricacies of Nmap, providing both novice and seasoned professionals with the tools and techniques needed to conduct thorough security assessments with confidence. The purpose of this book is to educate and empower cyber security professionals to increase their skill set, and by extension, contribute positively to the cyber security posture of organizations through the use of Nmap.
This book starts at the ground floor by establishing a baseline understanding of what Penetration Testing is, how it is similar but distinct from other types of security engagements, and just how powerful of a tool Nmap can be to include in a pen tester's arsenal. By systematically building the reader's proficiency through thought-provoking case studies, guided hands-on challenges, and robust discussions about how and why to employ different techniques, the reader will finish each chapter with new tangible skills.
With practical best practices and considerations, you'll learn how to optimize your Nmap scans while minimizing risks and false positives.
Table of Contents
1. Introduction to Nmap and Security Assessments
2. Setting Up a Lab Environment For Nmap
3. Introduction to Attack Surface Mapping
4. Identifying Vulnerabilities Through Reconnaissance and Enumeration
5. Mapping a Large Environment
6. Leveraging Zenmap and Legion
7. Advanced Obfuscation and Firewall Evasion Techniques
8. Leveraging the Nmap Scripting Engine
9. Best Practices and Considerations
APPENDIX A. Additional Questions
APPENDIX B. Nmap Quick Reference Guide
Index
Details
Erscheinungsjahr: | 2024 |
---|---|
Fachbereich: | Datenkommunikation, Netze & Mailboxen |
Genre: | Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
ISBN-13: | 9788197081866 |
ISBN-10: | 8197081867 |
Sprache: | Englisch |
Ausstattung / Beilage: | Paperback |
Einband: | Kartoniert / Broschiert |
Autor: | Deforge, Travis |
Hersteller: | Orange Education Pvt Ltd |
Maße: | 235 x 191 x 11 mm |
Von/Mit: | Travis Deforge |
Erscheinungsdatum: | 30.03.2024 |
Gewicht: | 0,392 kg |
Details
Erscheinungsjahr: | 2024 |
---|---|
Fachbereich: | Datenkommunikation, Netze & Mailboxen |
Genre: | Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
ISBN-13: | 9788197081866 |
ISBN-10: | 8197081867 |
Sprache: | Englisch |
Ausstattung / Beilage: | Paperback |
Einband: | Kartoniert / Broschiert |
Autor: | Deforge, Travis |
Hersteller: | Orange Education Pvt Ltd |
Maße: | 235 x 191 x 11 mm |
Von/Mit: | Travis Deforge |
Erscheinungsdatum: | 30.03.2024 |
Gewicht: | 0,392 kg |
Warnhinweis