categorias empresarial
páginaprincipal.livro.e-book_profissional

Ethical Hacking for Beginners

páginaprincipal.livro.por Mujthaba Hassan
(12 avaliações )
1 Avaliar
52
páginaprincipal.livro.idioma :  English
This book will help you understand how hacking really works. It is for informational and educational purposes only and we strongly advise against misuse.
Subscrição Profissional Plus grátis durante os primeiros 30 dias, após esse período $6.99/mês
Sem anúncios dentro do livro
Descrição
Conteúdos
Opiniões

This book will help you understand how hacking really works. It teaches you techniques to conduct these hacks yourself and ways in which you can safeguard from being hacked. This book is an easy read even if you are not well acquainted with computers. This book is for informational and educational purposes only. This book is against misuse of the information and we strongly suggest against it.

About the author

Mujthaba Hasan is a Digital Solutions Architect and a technology enthusiast. He currently works for an Oil & Gas company operating across 17 countries in Africa. He has previously worked with reputable companies around the world including Procter and Gamble (P&G), Exceed IT Services (Microsoft partner of the year, Gulf) & Infotouch (SME 40, Dubai). He is a consultant who specializes in developing enterprise solutions using SharePoint. He has worked on a variety of projects utilizing SharePoint, , PowerApps, Bots, jQuery, C#, Power BI, Azure, ASP.NET, Bootstrap, SQL Server, Web Services, Entity Framework, Angular, NodeJS, jQuery, JavaScript to name a few. He is a Microsoft Certified Solutions Developer in SharePoint Applications and App Builder. He received his Masters in Computer Application from Sri Jayachamarajendra College of Engineering (2015), the number 1 ranked college for MCA in Mysore, India. He received his MBA in Project Management through Sikkim Manipal University (2014). He completed his technical degrees with honorary distinction.Mujthaba can be contacted through email at mujthabahassan@gmail.com.

  • Acknowledgement
  • Disclaimer
  • About the author
  1. Introduction
    1. What is Ethical Hacking?
    2. Types of Hackers
    3. Getting Started
    4. Why should you do penetration test?
    5. Which domains are tested on CEH?
    6. Who is this book intended for?
  2. Phases of hacking
    1. Reconnaissance
    2. Scanning
    3. Enumeration
    4. Gaining Access
    5. Maintaining Access
    6. Clearing Tracks
  3. Password Cracking
    1. Demo
    2. How to stay protected?
  4. Malware
    1. Introduction
    2. Creating a Trojan
    3. How to stay protected?
  5. Viruses & Worms
    1. What is a virus?
    2. What is a worm?
    3. What is their motive?
    4. How to spot an infection?
    5. Let’s create a virus together
    6. Staying Vigilant
  6. Denial of Service Attacks
    1. What are DOS Attacks?
    2. Simple HTTP DoS Attack
    3. How to stay protected?
  7. Sniffing
    1. Why Sniff?
    2. Types of sniffing?
    3. Why would anybody sniff?
    4. How to stay protected?
  8. Buffer Overflow
    1. What is buffer overflow?
    2. Why did the buffer overflow?
    3. How to prevent buffer overflow?
  9. Social Engineering
    1. What is Social Engineering?
    2. Exploitable Human Attributes
    3. Types of Social Engineering Attacks
    4. How to stay protected?
  10. SQL Injection
    1. What is SQL Injection?
    2. How to stay protected?
  11. Web Server
    1. How can web servers be hacked?
    2. Common Web Server Vulnerabilities
    3. How to stay protected?
  12. Web Application
    1. What is a Web Application?
    2. How are Web Applications hacked?
    3. How to stay protected?
  13. Wireless Hacking
    1. Introduction
    2. Types of Hacks
    3. Top Tools of the craft
    4. How to stay protected?
  14. Mobile Platforms
    1. Introduction
    2. Types of hacks
    3. How to stay protected?
  15. Session Hijacking
    1. What is session?
    2. What is session hijacking?
    3. How can session hijacking occur?
    4. How to stay protected?
  16. Cryptography
    1. A brief history of cryptography?
    2. A modern overview of cryptography
    3. Types of cryptography
great book. very good for beginners.
More reviews
páginaprincipal.livro.sobre_autor