Buch, Englisch, 336 Seiten, Format (B × H): 156 mm x 234 mm
Buch, Englisch, 336 Seiten, Format (B × H): 156 mm x 234 mm
ISBN: 978-1-032-88743-2
Verlag: Taylor & Francis Ltd
In today's ever-evolving digital landscape, cybersecurity professionals are in high demand. These books equip you with the knowledge and tools to become a master cyber defender. The handbooks take you through the journey of ten essential aspects of practical learning and mastering cybersecurity aspects in the form of two volumes.
Volume 2: The journey continues with volume two for mastering advanced techniques for network traffic analysis using Wireshark and other network sniffers. Then, we unlock the power of Open-Source Intelligence (OSINT) to gather valuable intel from publicly available sources, including social media, web, images, and others. From there, explore the unique challenges of securing the Internet of Things (IoT) and conquer the art of reconnaissance, the crucial first stage of ethical hacking. Finally, we explore the dark web - a hidden corner of the internet - and learn safe exploration tactics to glean valuable intelligence. The book concludes by teaching you how to exploit vulnerabilities ethically during penetration testing and write pen test reports that provide actionable insights for remediation.
Zielgruppe
Professional Practice & Development, Professional Reference, and Professional Training
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Schadprogramme (Viren, Trojaner etc.)
- Geisteswissenschaften Architektur Gestaltung, Darstellung, Bautechnik
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Technische Wissenschaften Bauingenieurwesen Gebäudesicherheit
Weitere Infos & Material
11. Chapter 1: Networking for Cyber Professionals
Learn about the basics of networking, protocols, ports from Cybersecurity perspectives.
12. Chapter 2: Deciphering Data Streams: Network Traffic Analysis
Master the art of network traffic analysis using industry-standard tools to identify suspicious network activity and potential data breaches.
13. Chapter 3: Open-Source Intelligence: Harnessing Intelligence from Digital space
Discover the power of OSINT and learn to unveil digital footprints.
14. Chapter 4: Hands-on OSINT Investigations
Conduct real-world OSINT investigations, harnessing social media, web, and publicly available sources for gathering valuable intelligence.
15. Chapter 5: Securing of Smart Interconnected Devices
Explore the unique challenges of securing smart devices and internet-connected devices (IoT).
16. Chapter 6: Ethical Hacking of Smart IoT Devices
Perform penetration testing of Smart interconnected ecosystems to expose and exploit vulnerabilities.
17. Chapter 7: Into the Shadows: Theory of Dark Web Investigations
Go beyond the surface web and delve into the hidden online world of the dark web.
18. Chapter 8: Hands-on Dark Web Investigations
Learn safe exploration techniques to gather intelligence from hidden forums and marketplaces to stay ahead of potential threats.
19. Chapter 9: Exploit the Gaps: Theory of Ethical Exploitation and Reporting
Master the art of Ethical Hacking during penetration testing. Learn to document your findings.
20. Chapter 10: Hands-on Exploitation of OS & Apps
Master the art of exploiting vulnerabilities ethically during pen testing. Write compelling penetration testing reports that provide actionable insights for remediation.