Hands-On Ethical Hacking and Network Defense

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Wilson/Simpson/Antill's HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE, 4th edition, equips you with the knowledge and skills to protect networks using the tools and techniques of an ethical hacker. The authors explore the concept of ethical hacking and its practitioners -- explaining their importance in protecting corporate and government data -- and then deliver an in-depth guide to performing security testing. Thoroughly updated, the text covers new security resources, emerging vulnerabilities and innovative methods to protect networks, mobile security considerations, computer crime laws and penalties for illegal computer hacking. A final project brings concepts together in a penetration testing exercise and report, while virtual machine labs, auto-graded quizzes and interactive activities in the online learning platform help further prepare you for your role as a network security professional.

Author(s): Rob Wilson
Series: MindTap Course List
Edition: 4
Publisher: Cengage Learning
Year: 2022

Language: English
Pages: 448
City: Boston, MA
Tags: Penetration Testing; Computer Security; Computer Networks; Hackers

Cover
Brief Contents
Table of Contents
Introduction
Module 1: Ethical Hacking Overview
Introduction to Ethical Hacking
What You Can Do Legally
What You Cannot Do Legally
Summary
Key Terms
Review Questions
Case Projects
References
Module 2: TCP/IP Concepts Review
Overview of TCP/IP
IP Addressing
Overview of Numbering Systems
Module Summary
Key Terms
Review Questions
Case Projects
Module 3: Network and Computer Attacks
Malicious Software (Malware)
Protecting against Malware Attacks
Intruder Attacks on Networks and Computers
Addressing Physical Security
Module Summary
Key Terms
Review Questions
Case Projects
Module 4: Footprinting and Social Engineering
Using Web Tools for Footprinting
Conducting Competitive Intelligence
Using Domain Name System Zone Transfers
Introduction to Social Engineering
Module Summary
Key Terms
Review Questions
Case Projects
Module 5: Port Scanning
Introduction to Port Scanning
Using Port-Scanning Tools
Conducting Ping Sweeps
Understanding Scripting
Module Summary
Key Terms
Review Questions
Case Projects
Module 6: Enumeration
Introduction to Enumeration
Enumerating Windows Operating Systems
Enumerating *nix Operating System
Module Summary
Key Terms
Review Questions
Case Projects
Module 7: Programming for Security Professionals
Introduction to Computer Programming
Learning the C Language
Understanding HTML Basics
Understanding Perl
Understanding Object-Oriented Programming Concepts
Understanding Python
An Overview of Ruby
Module Summary
Key Terms
Review Questions
Case Projects
Module 8: Desktop and Server OS Vulnerabilities
Windows OS Vulnerabilities
Tools for Identifying Vulnerabilities in Windows
Best Practices for Hardening Windows Systems
Linux OS Vulnerabilities
Module Summary
Key Terms
Review Questions
Case Projects
Module 9: Embedded Operating Systems: The Hidden Threat
Introduction to Embedded Operating Systems
Windows and Other Embedded Operating Systems
Vulnerabilities of Embedded OSs
Module Summary
Key Terms
Review Questions
Case Projects
Module 10: Hacking Web Servers
Understanding Web Applications
Understanding Web Application Vulnerabilities
Tools for Web Attackers and Security Testers
Module Summary
Key Terms
Review Questions
Case Projects
Module 11: Hacking Wireless Networks
Understanding Wireless Technology
Understanding Wireless Network Standards
Understanding Authentication
Understanding Wardriving
Understanding Wireless Hacking
Module Summary
Key Terms
Review Questions
Case Projects
Module 12: Cryptography
Understanding Cryptography Basics
Understanding Symmetric and Asymmetric Algorithms
Understanding Public Key Infrastructure
Understanding Cryptography Attacks
Understanding Password Cracking
Module Summary
Key Terms
Review Questions
Case Projects
Module 13: Network Protection Systems
Using Network Protection Systems
Protecting with Firewalls
Protecting with Intrusion Detection and Prevention Systems
Using Honeypots
Module Summary
Key Terms
Review Questions
Case Projects
Module 14: Hands-On Ethical Hacking Final Project
Setting Up the Penetration Testing Lab
Creating a Penetration Testing Report
Performing the Penetration Testing
Hands-On Ethically Hacking Revisited
Module Summary
Review Questions
Appendix A: Legal Resources
Appendix B: Resources
Glossary
Index