skip to content
Ethical hacking : recon and footprinting Preview this item
ClosePreview this item
Checking...

Ethical hacking : recon and footprinting

Author: Chad Russell
Publisher: [Place of publication not identified] : Stone River eLearning, 2017.
Edition/Format:   eVideo : Clipart/images/graphics : English
Summary:
"This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! Each chapter closes with exercises putting your new learned skills into practical use immediately. This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Clipart/images/graphics, Internet resource, Videorecording
Document Type: Internet Resource, Computer File, Visual material
All Authors / Contributors: Chad Russell
OCLC Number: 1013545001
Notes: Title from resource description page (Safari, viewed November 28, 2017).
Performer(s): Presenter, Chad Russell.
Description: 1 online resource (1 streaming video file (42 min., 10 sec.)) : digital, sound, color
Other Titles: Recon and footprinting
Responsibility: Chad Russell.

Abstract:

"This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! Each chapter closes with exercises putting your new learned skills into practical use immediately. This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you! Each chapter closes with exercises putting your new learned skills into practical use immediately."--Resource description page.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1013545001> # Ethical hacking : recon and footprinting
    a schema:Movie, schema:CreativeWork, schema:VideoObject ;
    library:oclcnum "1013545001" ;
    rdfs:comment "Unknown 'gen' value: cig" ;
    schema:about <http://experiment.worldcat.org/entity/work/data/4650494773#Topic/computer_security> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/4650494773#Topic/penetration_testing_computer_security> ; # Penetration testing (Computer security)
    schema:about <http://experiment.worldcat.org/entity/work/data/4650494773#Topic/hacking> ; # Hacking
    schema:about <http://experiment.worldcat.org/entity/work/data/4650494773#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
    schema:alternateName "Recon and footprinting" ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/4650494773#Person/russell_chad> ; # Chad Russell
    schema:datePublished "2017" ;
    schema:description ""This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! Each chapter closes with exercises putting your new learned skills into practical use immediately. This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you! Each chapter closes with exercises putting your new learned skills into practical use immediately."--Resource description page."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/4650494773> ;
    schema:inLanguage "en" ;
    schema:name "Ethical hacking : recon and footprinting"@en ;
    schema:productID "1013545001" ;
    schema:url <http://proquest.safaribooksonline.com/?fpi=100000006a0721> ;
    schema:url <https://www.safaribooksonline.com/library/view/-/100000006A0721/?ar> ;
    schema:url <http://ezproxy.torontopubliclibrary.ca/login?url=http://proquestcombo.safaribooksonline.com/?uiCode=torontopl&xmlId=100000006A0721> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1013545001> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/4650494773#Person/russell_chad> # Chad Russell
    a schema:Person ;
    schema:familyName "Russell" ;
    schema:givenName "Chad" ;
    schema:name "Chad Russell" ;
    .

<http://experiment.worldcat.org/entity/work/data/4650494773#Topic/computer_networks_security_measures> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4650494773#Topic/computer_security> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4650494773#Topic/penetration_testing_computer_security> # Penetration testing (Computer security)
    a schema:Intangible ;
    schema:name "Penetration testing (Computer security)"@en ;
    .

<https://www.safaribooksonline.com/library/view/-/100000006A0721/?ar>
    rdfs:comment "from Safari" ;
    rdfs:comment "(Unlimited Concurrent Users)" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.