Hands-On Ethical Hacking and Network Defense
Course Technology Inc (Verlag)
978-0-357-50975-3 (ISBN)
Robert S. Wilson is the cybersecurity curriculum coordinator and a cybersecurity instructor for Willis College (Canada’s oldest career college). Rob created Willis College’s Software Development and Cybersecurity Analyst (CSA) programs. Willis College’s CSA program is currently being used by the Canadian Military to train cyber operator recruits. Rob has a computer science degree from the University of Waterloo, holds numerous certifications from CompTIA, Microsoft and Cisco, and has over 40 years of experience in the computing field. Rob has expertise in many areas including real time programming and embedded systems development (he worked for a company that has software on Mars), database development and administration, network and domain administration, penetration testing and cybersecurity. Michael T. Simpson is president/senior consultant of MTS Consulting, Inc., a firm specializing in network security and network design. His certifications include CEH, CISSP, Security+, OSSTMM Professional Security Tester (OPST), OSSTMM Professional Security Analyst (OPSA), ITIL, MCSE, MCDBA, MCSD, MCT, and OCP. He also holds an M.B.A. from M.B.A. Chaminade University and has authored or co-authored eight books. Mike has more than 30 years of industry experience, including 20 years with the U.S. Department of Defense, where he designed and configured computer networks, served as an Oracle® database and UNIX® administrator, and held multiple cyber security positions. Nicholas Antill is a seasoned information security professional with over 10 years of specialized cyber security experience. He specializes in penetration testing, proactive security controls, and network defense. In addition to earning a B.S. from the University of Pittsburgh and an M.S. from Capella University, he holds many industry certifications, including the OSCP, GWAPT, GPEN, GCIH, CISA, CISSP, and GCFE. Nicholas started his career at a small grocery chain in Pittsburgh, where he developed a fascination with network attack and defense techniques. He worked in support of the U.S. Department of Justice and the U.S. Department of Defense before returning to the private sector, where he currently manages the ethical hacking program at a large U.S. financial institution.
Module 1. Ethical Hacking Overview.
Module 2. TCP/IP Concepts Review.
Module 3. Network and Computer Attacks.
Module 4. Footprinting and Social Engineering.
Module 5. Port Scanning.
Module 7. Programming for Security Professionals.
Module 8. Desktop and Server OS Vulnerabilities.
Module 9. Embedded Operating Systems: The Hidden Threat.
Module 10. Hacking Web Applications.
Module 11. Hacking Wireless Networks.
Module 12. Cryptography.
Module 13. Network Protection Systems.
Module 14. The Final Project.
Appendix A. Legal Resources.
Appendix B. Resources.
Erscheinungsdatum | 11.04.2022 |
---|---|
Verlagsort | Boston, MA |
Sprache | englisch |
Maße | 217 x 277 mm |
Gewicht | 839 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
Wirtschaft | |
ISBN-10 | 0-357-50975-7 / 0357509757 |
ISBN-13 | 978-0-357-50975-3 / 9780357509753 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich