Get hands-on training and experience in tools, techniques, and best practices for effective ethical hacking to combat cyber threats at any scale
What’s inside
- Advice on how to use the ethical hacking methodology and thought process to perform a successful ethical hack
- An exploration of the various stages of an ethical hack and the tools related to each phase
- Hands-on exercises at the end of each chapter to ensure you solidify what you’ve learnt and get experience with the tools
- Purchase of the print or Kindle book includes a free PDF eBook
You'll get the most out of this book if
- You want to learn more about ethical hacking
- You already work as part of a security team, blue team, or purple team or as a security analyst ― but that’s not a prerequisite
- You want to become familiar with the same skills and tools that potential attackers may use to breach your system and identify security vulnerabilities
- You have a solid understanding of cloud computing and networking
What your journey will look like
- The Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools.
- By exploring the thought process involved in ethical hacking and the various techniques you can use to obtain results, you'll gain a deep understanding of how to leverage these skills effectively.
- Throughout the book, you'll learn how to conduct a successful ethical hack, how to use the tools correctly, and how to interpret the results to enhance your environment's security.
- By the end of this book, you'll be well-versed in ethical hacking and equipped with the skills and knowledge necessary to safeguard your enterprise against cyber-attacks.
Some of the things you'll learn in this book
- The key differences between encryption algorithms, hashing algorithms, and cryptography standards
- How to capture and analyze network traffic
- Mastering recon techniques for effective network penetration testing
- How to perform scanning techniques and network mapping
- Leveraging various tools for advanced privilege escalation and lateral movement
- Persistence mechanisms for maintaining access to compromised systems
Table of Contents
- Networking Primer
- Capturing and Analyzing Network Traffic
- Cryptography Primer
- Recon
- Scanning
- Gaining Access
- Maintaining Access
Rishalin Pillay is an Offensive Cybersecurity expert who holds a number of awards and certifications from multiple companies in the Cybersecurity industry. He is well known for his contributions to online learning courses related to Red Teaming and as the author of Learn Penetration Testing. He holds Content Publisher Gold and Platinum awards for his contributions made towards the Cybersecurity Industry, including the Events Speaker Gold award for influential public speaking at Tier-1 business events.<br /><br />Mohammed Abutheraa is Cybersecurity specialist who has over 15 years of experience in IT security, risk management, security infrastructure, and technology implementation in both private and public sector environments. He worked as Incident Response and Remediation Advisor and supported customers remediating against major incidents in the last years. He has experience in Threat Intelligence and Proactive Services like Vulnerability Assessments and Red / Purple Teaming experiences.