intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Introduction to penetration testing

Xem 1-11 trên 11 kết quả Introduction to penetration testing
  • Ebook Penetration tester’s: Open source toolkit – Part 1 includes contents: Chapter 1 reconnaissance, chapter 2 enumeration and scanning, chapter 3 introduction to testing databases, chapter 4 web server & web application testing, chapter 5 wireless penetration testing using auditor, chapter 6 network devices.

    pdf389p longtimenosee05 31-03-2024 1 0   Download

  • In "Penetration testing essentials", the following content will be discussed: Chapter 1 introduction to penetration testing, chapter 2 introduction to operating systems and networking, chapter 3 introduction to cryptography, chapter 4 outlining the pen testing methodology, chapter 5 gathering intelligence, chapter 6 scanning and enumeration, chapter 7 conducting vulnerability scanning, chapter 8 cracking passwords, chapter 9 retaining access with backdoors and malware, chapter 10 reporting, chapter 11 working with defensive and detection systems, chapter 12 covering your tracks and evading ...

    pdf287p longtimenosee05 31-03-2024 2 0   Download

  • Ebook Google hacking for penetration testers: Part 2 includes contents: Chapter 8 tracking down web servers, login portals, and network hardware; chapter 9 usernames, passwords, and secret stuff, oh my! chapter 10 document grinding and database digging; chapter 11 protecting yourself from google hackers; chapter 12 automating google searches; appendix a professional security testing; appendix b an introduction to web application security; appendix c google hacking database.

    pdf284p haojiubujain010 14-12-2023 4 2   Download

  • Ebook Unauthorised access: Physical penetration testing for IT security teams – Part 1 presents the following content: Chapter 1 the basics of physical penetration testing, chapter 2 planning your physical penetration tests, chapter 3 executing tests, chapter 4 an introduction to social engineering techniques, chapter 5 lock picking, chapter 6 information gathering.

    pdf142p haojiubujain06 06-09-2023 5 3   Download

  • Ebook Wardriving & wireless penetration testing: Part 1 presents the following content: Chapter 1 Introduction to wardriving and penetration testing, chapter 2 understanding antennas and antenna theory, chapter 3 handheld devices and direction finding, chapter 4 wardriving and penetration testing with Windows, chapter 5 wardriving and penetration testing with Linux, chapter 6 wardriving and wireless penetration testing with OS X.

    pdf183p haojiubujain06 06-09-2023 4 3   Download

  • Lecture "Penetration testing: Introduction to penetration testing" provide students with knowledge about: Types of penetration testing; The objects of penetration testing; Benefits of penetration testing;... Please refer to the detailed content of the lecture!

    pdf41p hoabingan205 12-12-2022 7 4   Download

  • "Ebook Kali Linux social engineering" present effectively perform efficient and organized social engineering tests and penetration testing using Kali Linux; introduction to social engineering attacks; understanding website attack vectors; performing client-side attacks through SET; understanding social engineering attacks.

    pdf84p honganthonganthong 10-01-2021 24 5   Download

  • The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more.

    pdf178p hoa_can 05-02-2013 92 19   Download

  • Jump to: navigation, search The Certified Ethical Hacker is a professional certification provided by the International Council of E-Commerce Consultants (EC-Council.) An ethical hacker is usually employed by an organization who trusts him or her to attempt to penetrate networks and/or computer systems, using the same methods as a hacker, for the purpose of finding and fixing computer security vulnerabilities. Unauthorized hacking (i.e.

    pdf0p doilan 25-01-2013 93 2   Download

  • I was planning to write a detail article on the basis of ethical hacking and penetration testing that cover the methodology, reporting and other things but some of my friend has shared this wonderful presentation that covers each and everything about ethical hacking and the process. Below is the presentation that covers the beginning of ethical hacking and it will let you know the procedure of hacking and penetration testing.

    pdf57p hoangtumayman 20-08-2012 134 31   Download

  • Shallow Foundations 31.1 31.2 31.3 31.4 Introduction Design Requirements Failure Modes of Shallow Foundations Bearing Capacity for Shallow Foundations Bearing Capacity Equation • Bearing Capacity on Sand from Standard Penetration Tests (SPT) • Bearing Capacity from Cone Penetration Tests (CPT) • Bearing Capacity from Pressuremeter Tests (PMT) • Bearing Capacity According to Building Codes • Predicted Bearing Capacity vs. Load Test Results

    pdf35p naunho 27-12-2010 76 12   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
5=>2