Ethical Hacking Workshop

£32.99

Ethical Hacking Workshop

Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity

Computer security Computer networking and communications Network security

Authors: Rishalin Pillay, Mohammed Abutheraa

Dinosaur mascot

Language: English

Published by: Packt Publishing

Published on: 31st October 2023

Format: LCP-protected ePub

ISBN: 9781804613047


Get a hands-on training and experience in tools, techniques, and best practices for effective ethical hacking to combat cyber threats at any scale

Key Features

Use the ethical hacking methodology and thought process to perform a successful ethical hack

Explore the various stages of an ethical hack and the tools related to each phase

Purchase of the print or Kindle book includes a free PDF eBook

Book Description

The Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools. By exploring the thought process involved in ethical hacking and the various techniques you can use to obtain results, you’ll gain a deep understanding of how to leverage these skills effectively. Throughout this book, you’ll learn how to conduct a successful ethical hack, how to use the tools correctly, and how to interpret the results to enhance your environment’s security. Hands-on exercises at the end of each chapter will ensure that you solidify what you’ve learnt and get experience with the tools. By the end of the book, you’ll be well-versed in ethical hacking and equipped with the skills and knowledge necessary to safeguard your enterprise against cyber-attacks.

What you will learn

Understand the key differences between encryption algorithms, hashing algorithms, and cryptography standards

Capture and analyze network traffic

Get to grips with the best practices for performing in-cloud recon

Get started with performing scanning techniques and network mapping

Leverage various top tools to perform privilege escalation, lateral movement, and implant backdoors

Find out how to clear tracks and evade detection

Who this book is for

This book is for cybersecurity professionals who already work as part of a security team, blue team, purple team or as a security analyst and want to become familiar with the same skills and tools that potential attackers may use to breach your system and identify security vulnerabilities. A solid understanding of cloud computing and networking is a prerequisite.

Show moreShow less