- Добавил: literator
- Дата: 14-11-2024, 03:36
- Комментариев: 0
Название: Mastering Cybersecurity: A Practical Guide for Professionals (Volume 1)
Автор: Akashdeep Bhardwaj
Издательство: CRC Press
Год: 2025
Страниц: 218
Язык: английский
Формат: pdf (true)
Размер: 50.1 MB
In today’s ever‑evolving digital landscape, cybersecurity professionals are in high demand. These books equip you with the knowledge and tools to become a master cyberdefender. The handbooks take you through the journey of ten essential aspects of practical learning and mastering cybersecurity aspects in the form of two volumes. Volume 1: The first volume starts with the fundamentals and hands‑on of performing log analysis on Windows and Linux systems. You will then build your own virtual environment to hone your penetration testing skills. But defense isn’t just about identifying weaknesses; it’s about building secure applications from the ground up. The book teaches you how to leverage Docker and other technologies for application deployments and AppSec management. Next, we delve into information gathering of targets as well as vulnerability scanning of vulnerable OS and Apps running on Damm Vulnerable Web Application (DVWA), Metasploitable2, Kioptrix, and others. You’ll also learn live hunting for vulnerable devices and systems on the Internet.
Автор: Akashdeep Bhardwaj
Издательство: CRC Press
Год: 2025
Страниц: 218
Язык: английский
Формат: pdf (true)
Размер: 50.1 MB
In today’s ever‑evolving digital landscape, cybersecurity professionals are in high demand. These books equip you with the knowledge and tools to become a master cyberdefender. The handbooks take you through the journey of ten essential aspects of practical learning and mastering cybersecurity aspects in the form of two volumes. Volume 1: The first volume starts with the fundamentals and hands‑on of performing log analysis on Windows and Linux systems. You will then build your own virtual environment to hone your penetration testing skills. But defense isn’t just about identifying weaknesses; it’s about building secure applications from the ground up. The book teaches you how to leverage Docker and other technologies for application deployments and AppSec management. Next, we delve into information gathering of targets as well as vulnerability scanning of vulnerable OS and Apps running on Damm Vulnerable Web Application (DVWA), Metasploitable2, Kioptrix, and others. You’ll also learn live hunting for vulnerable devices and systems on the Internet.