Ethical hacking : networks and websites /

Saved in:
Bibliographic Details
Author / Creator:Gupta, Sunil, speaker.
Imprint:[Place of publication not identified] : Apress, 2018.
Description:1 online resource (1 streaming video file (1 hr., 8 min., 56 sec.))
Language:English
Subject:
Format: E-Resource Video
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/13664438
Hidden Bibliographic Details
Notes:Title from resource description page (Safari, viewed January 17, 2019).
Presenter, Sunil Gupta.
Summary:"Take the next step in enhancing your ethical hacking skills. Having completed the basic tutorial, you should have a firm grasp of the basics of ethical hacking. This course will cover key aspects of network and website security. After gaining a basic view of footprinting and vulnerability scanning with the basic video course, you will now dive deep into these concepts. Starting with setting up your own network penetration lab, you take a look network footprinting, where you will learn to scan your network for vulnerabilities. Following this, you will learn various techniques to exploit your network and perform penetration tests using Kali Linux. Shifting focus to websites, you will go through the key techniques of website footprinting and also see how to find vulnerabilities in your website, where you will work with examples of website exploitation. Finally, you will cover injection attacks, a common exploit technique used to detect flaws and breaches in websites."--Resource description page

MARC

LEADER 00000cgm a2200000 i 4500
001 13664438
006 m o c
007 cr cna||||||||
007 vz czazuu
008 190122s2018 xx 069 o vleng d
005 20241126143215.2
035 9 |a (OCLCCM-CC)1083130554 
035 |a (OCoLC)1083130554 
037 |a CL0501000019  |b Safari Books Online 
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d OCLCQ  |d OCLCO 
049 |a MAIN 
050 4 |a QA76.9.A25 
100 1 |a Gupta, Sunil,  |e speaker. 
245 1 0 |a Ethical hacking :  |b networks and websites /  |c Sunil Gupta. 
264 1 |a [Place of publication not identified] :  |b Apress,  |c 2018. 
300 |a 1 online resource (1 streaming video file (1 hr., 8 min., 56 sec.)) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
337 |a video  |b v  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
511 0 |a Presenter, Sunil Gupta. 
500 |a Title from resource description page (Safari, viewed January 17, 2019). 
520 |a "Take the next step in enhancing your ethical hacking skills. Having completed the basic tutorial, you should have a firm grasp of the basics of ethical hacking. This course will cover key aspects of network and website security. After gaining a basic view of footprinting and vulnerability scanning with the basic video course, you will now dive deep into these concepts. Starting with setting up your own network penetration lab, you take a look network footprinting, where you will learn to scan your network for vulnerabilities. Following this, you will learn various techniques to exploit your network and perform penetration tests using Kali Linux. Shifting focus to websites, you will go through the key techniques of website footprinting and also see how to find vulnerabilities in your website, where you will work with examples of website exploitation. Finally, you will cover injection attacks, a common exploit technique used to detect flaws and breaches in websites."--Resource description page 
650 0 |a Hacking.  |0 http://id.loc.gov/authorities/subjects/sh2013002597 
650 0 |a Computer security.  |0 http://id.loc.gov/authorities/subjects/sh90001862 
650 0 |a Penetration testing (Computer security)  |0 http://id.loc.gov/authorities/subjects/sh2011003137 
650 0 |a Computer networks  |x Security measures.  |0 http://id.loc.gov/authorities/subjects/sh94001277 
650 2 |a Computer Security  |0 https://id.nlm.nih.gov/mesh/D016494 
650 6 |a Piratage informatique. 
650 6 |a Sécurité informatique. 
650 6 |a Tests d'intrusion. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Hacking.  |2 fast  |0 (OCoLC)fst01909643 
650 7 |a Penetration testing (Computer security)  |2 fast  |0 (OCoLC)fst01789566 
856 4 0 |u https://go.oreilly.com/uchicago/library/view/-/9781484243411/?ar  |y O'Reilly 
929 |a oclccm 
999 f f |s 02e3a156-22f4-48c4-8224-71ef4f2a14e7  |i 7c9a1dbf-461f-4976-bfd7-c2022c7b4555 
928 |t Library of Congress classification  |a QA76.9.A25  |l Online  |c UC-FullText  |u https://go.oreilly.com/uchicago/library/view/-/9781484243411/?ar  |z O'Reilly  |g ebooks  |i 13807376