×
Dodano do koszyka:
Pozycja znajduje się w koszyku, zwiększono ilość tej pozycji:
Zakupiłeś już tę pozycję:
Książkę możesz pobrać z biblioteki w panelu użytkownika
Pozycja znajduje się w koszyku
Przejdź do koszyka

Zawartość koszyka

ODBIERZ TWÓJ BONUS :: »

The Complete Metasploit Guide. Explore effective penetration testing techniques with Metasploit

(ebook) (audiobook) (audiobook) Książka w języku angielskim
The Complete Metasploit Guide. Explore effective penetration testing techniques with Metasploit Sagar Rahalkar, Nipun Jaswal - okladka książki

The Complete Metasploit Guide. Explore effective penetration testing techniques with Metasploit Sagar Rahalkar, Nipun Jaswal - okladka książki

The Complete Metasploit Guide. Explore effective penetration testing techniques with Metasploit Sagar Rahalkar, Nipun Jaswal - audiobook MP3

The Complete Metasploit Guide. Explore effective penetration testing techniques with Metasploit Sagar Rahalkar, Nipun Jaswal - audiobook CD

Ocena:
Bądź pierwszym, który oceni tę książkę
Dostępne formaty:
     PDF
     ePub
     Mobi

Ebook (161,10 zł najniższa cena z 30 dni)

179,00 zł (-83%)
29,90 zł

Dodaj do koszyka lub Kup na prezent Kup 1-kliknięciem

(161,10 zł najniższa cena z 30 dni)

Przenieś na półkę

Do przechowalni

Most businesses today are driven by their IT infrastructure, and the tiniest crack in this IT network can bring down the entire business. Metasploit is a pentesting network that can validate your system by performing elaborate penetration tests using the Metasploit Framework to secure your infrastructure.

This Learning Path introduces you to the basic functionalities and applications of Metasploit. Throughout this book, you’ll learn different techniques for programming Metasploit modules to validate services such as databases, fingerprinting, and scanning. You’ll get to grips with post exploitation and write quick scripts to gather information from exploited systems. As you progress, you’ll delve into real-world scenarios where performing penetration tests are a challenge. With the help of these case studies, you’ll explore client-side attacks using Metasploit and a variety of scripts built on the Metasploit Framework.

By the end of this Learning Path, you’ll have the skills required to identify system vulnerabilities by using thorough testing.

This Learning Path includes content from the following Packt products:
Metasploit for Beginners by Sagar Rahalkar
Mastering Metasploit - Third Edition by Nipun Jaswal

Wybrane bestsellery

O autorach książki

Sagar Rahalkar is a seasoned information security professional having more than 10 years of comprehensive experience in various verticals of IS. His domain expertise is mainly into breach detection, cyber crime investigations, digital forensics, application security, vulnerability assessment and penetration testing, compliance for mandates and regulations, IT GRC, and much more. He holds a masters degree in computer science and several industry-recognized certifications such as Certified Cyber Crime Investigator, Certified Ethical Hacker, Certified Security Analyst, ISO 27001 Lead Auditor, IBM certified Specialist-Rational AppScan, Certified Information Security Manager (CISM), and PRINCE2. He has been closely associated with Indian law enforcement agencies for more than 3 years dealing with digital crime investigations and related training and received several awards and appreciations from senior officials of the police and defense organizations in India. Sagar has also been a reviewer and author for various books and online publications.
Nipun Jaswal is an international cybersecurity author and an award-winning IT security researcher with more than a decade of experience in penetration testing, Red Team assessments, vulnerability research, RF, and wireless hacking. He is presently the Director of Cybersecurity Practices at BDO India. Nipun has trained and worked with multiple law enforcement agencies on vulnerability research and exploit development. He has also authored numerous articles and exploits that can be found on popular security databases, such as PacketStorm and exploit-db. Please feel free to contact him at @nipunjaswal.

Sagar Rahalkar, Nipun Jaswal - pozostałe książki

Packt Publishing - inne książki

Zamknij

Przenieś na półkę

Proszę czekać...
ajax-loader

Zamknij

Wybierz metodę płatności

Ebook
29,90 zł
Dodaj do koszyka
Zamknij Pobierz aplikację mobilną Ebookpoint