-
出版商:
Independently Published
-
出版日期:
2019-07-30
-
售價:
$840
-
貴賓價:
9.5 折
$798
-
語言:
英文
-
頁數:
84
-
裝訂:
Quality Paper - also called trade paper
-
ISBN:
1086432622
-
ISBN-13:
9781086432626
-
相關分類:
駭客 Hack
商品描述
Do you want learn about how to begin with a Penetration-Testing Objectives?Do you want a practical book that explains step-by-step how to create a Pen-Test Checklist of Requirements?Do you want to become an Ethical Hacker or Pen-Tester?If the answer is yes to the above questions, this book is for you Frequently Asked Questions-Question: I am new to IT, and I don't have any experience in the field of Hacking, should I get this book?-Answer: This book is designed to those interested in Penetration Testing aka Ethical Hacking, and having limited, or no experience in the realm of Cybersecurity.-Question: I am not a hacker. Are there any technical prerequisites for reading this book?-Answer: No. This book is written in everyday English, and no technical experience required.-Question: I have been reading similar books before, but I am still not sure if I should buy this book. How do I know this book is any good?-Answer: This book is written by a Security Architect, having over a decade of experience on platforms such as: Cisco Systems, Checkpoint, Palo Alto, Brocade, Back Track / Kali Linux, RedHat Linux, CentOS, Orion, Prime, DLP, IPS, IDS, Nexus, and much more... Learning from someone with real life experience is extremely valuable. You will learn about real life technologies and methodologies used in today's IT Infrastructure, and Cybersecurity Division.BUY THIS BOOK NOW, AND GET STARTED TODAY IN THIS BOOK YOU WILL LEARN: How to Establish Pen-Test ObjectivesWhat Types of Penetration Tests ExistsWhat's is a Pre-engagement aka Stage 1How to build a Checklist of RequirementsHow to create a Client site Security ChecklistHow to Compromise the Target aka Stage 2What to include in your Post-attack aka Stage 3What Pen-Test Standard Suits you bestWhat kinds of Target Footprinting Methods you should utilizeWhat steps are involved in the Reconnaissance ProcessWhat kinds of Target Scanning Techniques you should utilizeHow to Check for existing VulnerabilitiesSNMP & NMAP Enumeration TechniquesNTP & SMTP Enumeration Techniques, and much more...BUY THIS BOOK NOW, AND GET STARTED TODAY
商品描述(中文翻譯)
你想了解如何開始進行滲透測試的目標嗎?你想要一本實用的書,逐步解釋如何創建滲透測試需求清單嗎?你想成為一名道德駭客或滲透測試員嗎?如果以上問題的答案是肯定的,那麼這本書就是為你而寫的。
常見問題解答
- 問:我對IT是新手,並且在駭客領域沒有任何經驗,我應該購買這本書嗎?
- 答:這本書是為那些對滲透測試(即道德駭客)感興趣的人設計的,並且在網路安全領域有有限或沒有經驗的人。
- 問:我不是駭客。閱讀這本書有任何技術前提嗎?
- 答:沒有。這本書是用日常英語撰寫的,不需要任何技術經驗。
- 問:我之前讀過類似的書,但仍然不確定是否應該購買這本書。我怎麼知道這本書是否值得?
- 答:這本書是由一位安全架構師撰寫的,他在Cisco Systems、Checkpoint、Palo Alto、Brocade、Back Track / Kali Linux、RedHat Linux、CentOS、Orion、Prime、DLP、IPS、IDS、Nexus等平台上擁有超過十年的經驗。向擁有實際經驗的人學習是非常有價值的。你將學習到當今IT基礎設施和網路安全部門中使用的實際技術和方法論。
立即購買這本書,今天就開始學習!在這本書中你將學到:
- 如何建立滲透測試目標
- 存在什麼類型的滲透測試
- 什麼是前期接觸(即第一階段)
- 如何建立需求清單
- 如何創建客戶網站安全清單
- 如何攻陷目標(即第二階段)
- 在攻擊後(即第三階段)應包含什麼
- 哪種滲透測試標準最適合你
- 你應該利用哪些目標足跡方法
- 偵查過程中涉及哪些步驟
- 你應該利用哪些目標掃描技術
- 如何檢查現有的漏洞
- SNMP 和 NMAP 列舉技術
- NTP 和 SMTP 列舉技術,以及更多...
立即購買這本書,今天就開始學習!