×
Dodano do koszyka:
Pozycja znajduje się w koszyku, zwiększono ilość tej pozycji:
Zakupiłeś już tę pozycję:
Książkę możesz pobrać z biblioteki w panelu użytkownika
Pozycja znajduje się w koszyku
Przejdź do koszyka

Zawartość koszyka

ODBIERZ TWÓJ BONUS :: »

Mastering Windows Privilege Escalation. Reveal Windows' secrets and explore artful access methods Asmaa Kotb

(ebook) (audiobook) (audiobook) Książka w języku 1
Mastering Windows Privilege Escalation. Reveal Windows' secrets and explore artful access methods Asmaa Kotb - okladka książki

Mastering Windows Privilege Escalation. Reveal Windows' secrets and explore artful access methods Asmaa Kotb - okladka książki

Mastering Windows Privilege Escalation. Reveal Windows' secrets and explore artful access methods Asmaa Kotb - audiobook MP3

Mastering Windows Privilege Escalation. Reveal Windows' secrets and explore artful access methods Asmaa Kotb - audiobook CD

Autor:
Asmaa Kotb
Serie wydawnicze:
Mastering
Ocena:
Stron:
171
Mastering Windows Privilege Escalation is a comprehensive guide that delves into the significance of privilege escalation, explores Windows security mechanisms, and provides practical insights into bypassing security barriers. This book takes you on a comprehensive journey through the intricate world of privilege escalation.
Starting with an introduction to privilege escalation concepts and Windows security mechanisms, the book gradually progresses to cover essential topics such as lab setup and environment preparation, enumeration techniques, gaining an initial foothold, kernel exploits, token impersonation, password-based escalation, and much more. Each chapter is meticulously crafted with hands-on labs to enhance practical understanding. It also provides insights into detection and mitigation techniques, empowering you to fortify your defenses against privilege escalation risks.
By the end of this book, readers will have developed a mastery of Windows Privilege Escalation. You will get a deep understanding of privilege escalation concepts, Windows security mechanisms, and access control models. Ultimately, you will emerge as proficient practitioners in detecting and mitigating privilege escalation risks, empowering them to safeguard digital environments and take command of their cybersecurity journey.

Wybrane bestsellery

O autorze książki

Asmaa Kotb is the founder and CEO of KoCyber LTD. Asmaa has extensive experience in the field through diverse roles across various industries. Her expertise is rooted in hands-on experience gained from professional penetration testing engagements, Capture The Flag (CTF) competitions, and platforms like Hack The Box and VulnHub.
Asmaa holds a range of professional cybersecurity certifications, starting from CCNA Security to CISSP. Her commitment to the industry has garnered invitations as a speaker at numerous professional conferences and television interviews. She actively participates in cybersecurity conferences organized by universities, where she shares insights on initiating a cybersecurity career and engages in discussions on current and emerging cybersecurity topics.
Asmaa pursued her education at Zagazig University's Faculty of Engineering, specializing in Electronics and Communication. She graduated with distinction, achieving a Very Good with Honor grade. Additionally, she holds a cybersecurity diploma from the Information Technology Institute (ITI) in Egypt.
Asmaa serves as a mentor in multiple cybersecurity mentorship programs, providing technical and personal guidance to inspire young individuals to venture into the cybersecurity field.

Zobacz pozostałe książki z serii Mastering

Packt Publishing - inne książki

Zamknij

Przenieś na półkę

Proszę czekać...
ajax-loader

Zamknij

Wybierz metodę płatności

Zamknij Pobierz aplikację mobilną Ebookpoint
Zabrania się wykorzystania treści strony do celów eksploracji tekstu i danych (TDM), w tym eksploracji w celu szkolenia technologii AI i innych systemów uczenia maszynowego. It is forbidden to use the content of the site for text and data mining (TDM), including mining for training AI technologies and other machine learning systems.