Ethical Hacking & Cybersecurity For Beginners

audiobook (Unabridged) Pen Test Workflow & Lab Building Basics | 2 Books In 1

By ATTILA KOVACS

cover image of Ethical Hacking & Cybersecurity For Beginners
Audiobook icon Visual indication that the title is an audiobook

Sign up to save your library

With an OverDrive account, you can save your favorite libraries for at-a-glance information about availability. Find out more about OverDrive accounts.

   Not today

Find this title in Libby, the library reading app by OverDrive.

Download Libby on the App Store Download Libby on Google Play

Search for a digital library with this title

Title found at these libraries:

Library Name Distance
Loading...

2 AUDIOBOOKS IN 1!

  • Book 1 - How To Build Your Pen Test Lab Fast
  • Book 2 - How To Defend Against Hackers & Malware
  • BUY THIS AUDIOBOOK NOW AND GET STARTED TODAY!

    You will learn:

    AUDIOBOOK 1:

    What are the Frameworks of Penetration Testing

    What Scanning Tools you should be Aware

    What Credential Testing Tools you must Utilize

    How to Setup a Lab in NPE

    How to Setup Hyper-V on Windows 10

    How to Setup VMware on Windows 10

    How to Assemble the Required Resources

    How to Configure Windows Server in VMware

    How to Configure Windows Server in Hyper-V

    How to Install & Configure OWASP-BWA in VMware

    How to Install & Configure Metasploitable in VMware

    How to Install Kali Linux in VMware

    How to Install BlackArch in Hyper-V

    What are the Rules of Engagement

    How to set Objectives & Deliverables

    What Type of Targets you must deal with

    Specialized Systems for Pen Testers

    How to Identify & Response to Risk

    How to Prepare your Pen Test Team for an Engagement


    AUDIOBOOK 2:

    How to use Trend Analysis to Prevent Intrusion

    What is Data Aggregation and Correlation

    What is Defense in Depth

    What Breach Detection Tools you can Deploy

    What is and How to Deploy EMET aka Enhanced Mitigation Experience Toolkit

    Why you must use Web Application Firewalls VS Proxys

    What is Pen Testing and how to Identify Security Flows

    What Pen Test Procedures you must follow

    How Reverse Engineering Works

    What Risk Evaluation Steps you must Follow

    What are the Policy Framework Procedures

    What are the Control Framework Procedures

    What is and how to Deploy Quality Controls & Verification Processes, and much more...

    BUY THIS BOOK NOW AND GET STARTED TODAY!

    Ethical Hacking & Cybersecurity For Beginners