Master penetration testing and cybersecurity using this comprehensive guide!

Hacking and Security The Comprehensive Guide to Penetration Testing and Cybersecurity







Print edition E-book Bundle
1141 pages, , Print edition paperback
ISBN 978-1-4932-2425-8
1141 pages,
E-book formats: EPUB, PDF, online
ISBN 978-1-4932-2426-5
1141 pages, , Print edition paperback
E-book formats: EPUB, PDF, online
ISBN 978-1-4932-2427-2
Uncover security vulnerabilities and harden your system against attacks! With this guide you’ll learn to set up a virtual learning environment where you can test out hacking tools, from Kali Linux to hydra and Wireshark. Then expand your understanding of offline hacking, external safety checks, penetration testing in networks, and other essential security techniques, with step-by-step instructions. With information on mobile, cloud, and IoT security you can fortify your system against any threat!
  • Understand IT system vulnerabilities and identify attack vectors
  • Learn to secure multiple infrastructures, including Linux, Microsoft Windows, cloud, and mobile
  • Master pen testing with tools like Metasploit, Kali Linux, hydra, Open-VAS, Empire, Pwnagotchi, and more
About the Book About the E-book 1141 pages, paperback, 2.27 in. Reference book format 7 x 10 in. Printed black and white on 50# offset paper [most of the time, from sustainable sources. Casebound for durability. Reader-friendly serif font (TheAntiquaB 9.5 Pt.). One-column layout. E-book in full color. PDF (74 MB), EPUB (31 MB) file for download, DRM-free with personalized digital watermark. Copy and paste, bookmarks, and print-out permitted. Table of contents, in-text references, and index fully linked. Including online book edition in dedicated reader application.

In this book, you’ll learn about:

  1. Key Concepts and Tools

    Set up your environment with Metasploitable and Juice Shop and install Kali Linux. Then explore hacking tools like nmap, hydra, and Armitage that will assist you with the more complex practices covered in later chapters.

  2. Penetration Testing and Security Practices

    From thwarting man-in-the-middle attacks to finding vulnerabilities, walk step by step through client-side and network penetration testing. Master key security techniques like IT forensics and safety checks and see how to secure Windows servers, Linux, Samba file servers, and web applications.

  3. Advanced Security Concepts

    Get practical instruction on more advanced topics like cloud, mobile, and IoT security. Learn how to secure Office 365 through multi-level authentication and conditional access, explore protective measures for Android and iOS, and determine IoT protocols and services.

Highlights Include:

  • Penetration testing
  • Offline hacking
  • Active Directory
  • Linux
  • Cloud security
  • Mobile and IoT security
  • IT forensics
  • Windows security
  • USB attacks
  • Web application security
  • Software exploitation

Michael Kofler is a renowned author of German IT publications. He works as an administrator and software developer, and is also a lecturer at a technical college.

Klaus Gebeshuber is the professor of IT security at FH JOANNEUM, University of Applied Sciences in Kapfenberg, Austria.

Peter Kloep is an expert of secure Microsoft Windows infrastructures in German-speaking countries.

Frank Neugebauer worked in IT security for more than 25 years as an officer in the German Armed Forces.

André Zingsheim works as a senior security consultant at TÜV TRUST IT GmbH. In addition to technical security analyzes and penetration tests of IT systems and infrastructures, he deals intensively with the security of mobile devices.

Thomas Hackner is senior security consultant and managing director of HACKNER Security Intelligence GmbH, which he founded in 2010 after studying secure information systems in Hagenberg, Upper Austria.

Markus Widl has been working as a consultant, developer, and trainer in IT for more than 20 years.

Roland Aigner is an expert in secure IoT infrastructures. He developed firmware and software for medical in-vitro diagnostics, is a co-author of the Bluetooth SIG, and a founding member of the NFC Forum, where he was specifically responsible for ticketing and communication security.

Stefan Kania has been a freelance consultant and trainer since 1997. His focus is on the secure implementation of Samba and LDAP as well as training on both topics.

Tobias Scheible is a research associate at Albstadt-Sigmaringen University. There he works as a lecturer in the university certificate program at the Institut für wissenschaftliche Weiterbildung (IWW) (Institute for Scientific Continuing Education) and holds extra-occupational modules in the areas of network security, Internet technologies, and IT forensics.

Matthias Wübbeling is an IT security enthusiast, scientist, author, entrepreneur, consultant, and speaker.

more >

You may also like:

  • Cover of Full Stack Web Development

    Full Stack Web Development
    The Comprehensive Guide

    Philip Ackermann

    740 pages, paperback

    Full stack web developers are always in demand—do you have the skillset? Between these pages you’ll learn to design websites with CSS, structure them with HTML, and add interactivity with JavaScript. You’ll master the different web protocols, formats, and architectures More about the book

    from $54.99


    E-book | Print edition | Bundle
  • Cover of Python 3

    Python 3
    The Comprehensive Guide

    Johannes Ernesti, Peter Kaiser

    1036 pages, paperback

    Ready to master Python? Learn to write effective code with this award-winning comprehensive guide, whether you’re a beginner or a professional programmer. Review core Python concepts, including functions, modularization, and object orientation, and walk through the available data types. Then More about the book

    from $54.99


    E-book | Print edition | Bundle
  • Cover of DevOps with SAP

    DevOps with SAP

    Raja Gupta, Sandip Jha

    387 pages, hardcover

    Discover what DevOps can do to improve your SAP development pipeline! Learn exactly what DevOps is and what tools it provides for version control, coding, test automation, deployment, and monitoring. Walk through SAP’s complete DevOps portfolio for on-premise systems, using More about the book

    from $84.99


    E-book | Print edition | Bundle