skip to content
Cybersecurity attacks (Red Team activity) Preview this item
ClosePreview this item
Checking...

Cybersecurity attacks (Red Team activity)

Author: Sergii Nesterenko
Publisher: [Place of publication not identified] : Packt, [2018]
Edition/Format:   eVideo : Clipart/images/graphics : English
Summary:
"There is only way to become really good at cybersecurity: you must know both how to attack and how to defend. First of all, you have to learn to think like a hacker, so you deeply understand what the threats are. Then you’ll need to know how to protect yourself from the attacks. We start with precise descriptions and examples of network attacks to show you how the malicious hackers can break into your network—and  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Clipart/images/graphics, Internet resource, Videorecording
Document Type: Internet Resource, Computer File, Visual material
All Authors / Contributors: Sergii Nesterenko
OCLC Number: 1029302259
Notes: Title from title screen (viewed March 20, 2018).
Date of publication from resource description page.
Performer(s): Presenter, Sergii Nesterenko.
Description: 1 online resource (1 streaming video file (3 hr., 35 min., 31 sec.)) : digital, sound, color
Responsibility: Sergii Nesterenko.

Abstract:

"There is only way to become really good at cybersecurity: you must know both how to attack and how to defend. First of all, you have to learn to think like a hacker, so you deeply understand what the threats are. Then you’ll need to know how to protect yourself from the attacks. We start with precise descriptions and examples of network attacks to show you how the malicious hackers can break into your network—and what harm they can do. Then we’ll look at another attack vector: websites and web-applications. You’ll see the most vulnerable places and understand what cybercriminals will do if they find them.Then we’ll discover the third vector of attacks: humans. Refined hackers know how to hack a human brain first to hack digital assets. You’ll find out what social engineering, phishing, and spear-phishings, and why they’re becoming especially dangerous today.By the end of this course, you’ll be able to locate all your vulnerabilities and remediate them before malicious hackers find and exploit them."--Resource description page.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1029302259> # Cybersecurity attacks (Red Team activity)
    a schema:Movie, schema:CreativeWork, schema:VideoObject ;
    library:oclcnum "1029302259" ;
    rdfs:comment "Unknown 'gen' value: cig" ;
    schema:about <http://experiment.worldcat.org/entity/work/data/4847020194#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/4847020194#Topic/computer_security> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/4847020194#Topic/computer_crimes> ; # Computer crimes
    schema:creator <http://experiment.worldcat.org/entity/work/data/4847020194#Person/nesterenko_sergii> ; # Sergii Nesterenko
    schema:datePublished "2018" ;
    schema:description ""There is only way to become really good at cybersecurity: you must know both how to attack and how to defend. First of all, you have to learn to think like a hacker, so you deeply understand what the threats are. Then you’ll need to know how to protect yourself from the attacks. We start with precise descriptions and examples of network attacks to show you how the malicious hackers can break into your network—and what harm they can do. Then we’ll look at another attack vector: websites and web-applications. You’ll see the most vulnerable places and understand what cybercriminals will do if they find them.Then we’ll discover the third vector of attacks: humans. Refined hackers know how to hack a human brain first to hack digital assets. You’ll find out what social engineering, phishing, and spear-phishings, and why they’re becoming especially dangerous today.By the end of this course, you’ll be able to locate all your vulnerabilities and remediate them before malicious hackers find and exploit them."--Resource description page."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/4847020194> ;
    schema:inLanguage "en" ;
    schema:name "Cybersecurity attacks (Red Team activity)"@en ;
    schema:productID "1029302259" ;
    schema:url <http://ezproxy.torontopubliclibrary.ca/login?url=http://proquestcombo.safaribooksonline.com/?uiCode=torontopl&xmlId=9781788478878> ;
    schema:url <https://login.library.sheridanc.on.ca/login?url=http://proquestcombo.safaribooksonline.com/?uiCode=sheridan&xmlId=9781788478878> ;
    schema:url <http://proquest.safaribooksonline.com/?fpi=9781788478878> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1029302259> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/4847020194#Person/nesterenko_sergii> # Sergii Nesterenko
    a schema:Person ;
    schema:familyName "Nesterenko" ;
    schema:givenName "Sergii" ;
    schema:name "Sergii Nesterenko" ;
    .

<http://experiment.worldcat.org/entity/work/data/4847020194#Topic/computer_networks_security_measures> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4847020194#Topic/computer_security> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.