Détail de l'auteur
Auteur Glen D. SINGH |
Documents disponibles écrits par cet auteur (6)
Ajouter le résultat dans votre panier Faire une suggestion Affiner la recherche
Reconnaissance for Ethical Hackers : Focus on the starting point of data breaches and explore essential steps for successful pentesting / Glen D. SINGH / PACKT PUBLISHING (2023)
Titre : Reconnaissance for Ethical Hackers : Focus on the starting point of data breaches and explore essential steps for successful pentesting Type de document : e-book Auteurs : Glen D. SINGH Editeur : PACKT PUBLISHING Année de publication : 2023 ISBN/ISSN/EAN : 9781837630639 Note générale : copyrighted Langues : Anglais (eng) Résumé : Use real-world reconnaissance techniques to efficiently gather sensitive information on systems and networks Purchase of the print or Kindle book includes a free PDF eBookKey FeaturesLearn how adversaries use reconnaissance techniques to discover security vulnerabilities on systemsDevelop advanced open source intelligence capabilities to find sensitive informationExplore automated reconnaissance and vulnerability assessment tools to profile systems and networksBook DescriptionThis book explores reconnaissance techniques – the first step in discovering security vulnerabilities and exposed network infrastructure. It aids ethical hackers in understanding adversaries’ methods of identifying and mapping attack surfaces, such as network entry points, which enables them to exploit the target and steal confidential information. Reconnaissance for Ethical Hackers helps you get a comprehensive understanding of how threat actors are able to successfully leverage the information collected during the reconnaissance phase to scan and enumerate the network, collect information, and pose various security threats. This book helps you stay one step ahead in knowing how adversaries use tactics, techniques, and procedures (TTPs) to successfully gain information about their targets, while you develop a solid foundation on information gathering strategies as a cybersecurity professional. The concluding chapters will assist you in developing the skills and techniques used by real adversaries to identify vulnerable points of entry into an organization and mitigate reconnaissance-based attacks. By the end of this book, you’ll have gained a solid understanding of reconnaissance, as well as learned how to secure yourself and your organization without causing significant disruption.What you will learnUnderstand the tactics, techniques, and procedures of reconnaissanceGrasp the importance of attack surface management for organizationsFind out how to conceal your identity online as an ethical hackerExplore advanced open source intelligence (OSINT) techniquesPerform active reconnaissance to discover live hosts and exposed portsUse automated tools to perform vulnerability assessments on systemsDiscover how to efficiently perform reconnaissance on web applicationsImplement open source threat detection and monitoring toolsWho this book is forIf you are an ethical hacker, a penetration tester, red teamer, or any cybersecurity professional looking to understand the impact of reconnaissance-based attacks, how they take place, and what organizations can do to protect against them, then this book is for you. Cybersecurity professionals will find this book useful in determining the attack surface of their organizations and assets on their network, while understanding the behavior of adversaries. Nombre d'accès : Illimité En ligne : http://library.ez.neoma-bs.fr/login?url=https://www.scholarvox.com/book/88946745 Permalink : https://cataloguelibrary.neoma-bs.fr/index.php?lvl=notice_display&id=581109 CompTIA Network+ N10-008 Certification Guide : The ultimate guide to passing the N10-008 exam / Glen D. SINGH / PACKT PUBLISHING (2022)
Titre : CompTIA Network+ N10-008 Certification Guide : The ultimate guide to passing the N10-008 exam Type de document : e-book Auteurs : Glen D. SINGH Editeur : PACKT PUBLISHING Année de publication : 2022 ISBN/ISSN/EAN : 9781803236063 Note générale : copyrighted Langues : Anglais (eng) Résumé : Become a network specialist by developing your skills in network implementation, operations and security while covering all the exam topics for CompTIA Network+ N10-008 certification in an easy-to-follow guide.Purchase of the print or Kindle book includes a free eBook in the PDF format.Key FeaturesA step-by-step guide to gaining a clear understanding of the Network+ certificationLearn about network architecture, protocols, security, and network troubleshootingConfidently ace the N10-008 exam with the help of 200+ practice test questions and answersBook DescriptionThis book helps you to easily understand core networking concepts without the need of prior industry experience or knowledge within this fi eld of study. This updated second edition of the CompTIA Network+ N10-008 Certification Guide begins by introducing you to the core fundamentals of networking technologies and concepts, before progressing to intermediate and advanced topics using a student-centric approach.You'll explore best practices for designing and implementing a resilient and scalable network infrastructure to support modern applications and services. Additionally, you'll learn network security concepts and technologies to effectively secure organizations from cyber attacks and threats. The book also shows you how to efficiently discover and resolve networking issues using common troubleshooting techniques.By the end of this book, you'll have gained sufficient knowledge to efficiently design, implement, and maintain a network infrastructure as a successful network professional within the industry. You'll also have gained knowledge of all the official CompTIA Network+ N10-008 exam objectives, networking technologies, and how to apply your skills in the real world.What you will learnExplore common networking concepts, services, and architectureIdentify common cloud architecture and virtualization conceptsDiscover routing and switching technologiesImplement wireless technologies and solutionsUnderstand network security concepts to mitigate cyber attacksExplore best practices to harden networks from threatsUse best practices to discover and resolve common networking issuesWho this book is forThis book is for students, network administrators, network engineers, NOC engineers, systems administrators, cybersecurity professionals, and enthusiasts. No prior knowledge in networking is required to get started with this book. Nombre d'accès : Illimité En ligne : http://library.ez.neoma-bs.fr/login?url=https://www.scholarvox.com/book/88937880 Permalink : https://cataloguelibrary.neoma-bs.fr/index.php?lvl=notice_display&id=562786
Titre : The Ultimate Kali Linux Book Type de document : e-book Auteurs : Glen D. SINGH Editeur : PACKT PUBLISHING Année de publication : 2022 ISBN/ISSN/EAN : 9781801818933 Note générale : copyrighted Langues : Anglais (eng) Résumé : Explore the latest ethical hacking tools and techniques to perform penetration testing from scratchKey FeaturesLearn to compromise enterprise networks with Kali LinuxGain comprehensive insights into security concepts using advanced real-life hacker techniquesUse Kali Linux in the same way ethical hackers and penetration testers do to gain control of your environmentBook DescriptionKali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks.This book is a comprehensive guide for those who are new to Kali Linux and penetration testing that will have you up to speed in no time. Using real-world scenarios, you'll understand how to set up a lab and explore core penetration testing concepts. Throughout this book, you'll focus on information gathering and even discover different vulnerability assessment tools bundled in Kali Linux. You'll learn to discover target systems on a network, identify security flaws on devices, exploit security weaknesses and gain access to networks, set up Command and Control (C2) operations, and perform web application penetration testing. In this updated second edition, you'll be able to compromise Active Directory and exploit enterprise networks. Finally, this book covers best practices for performing complex web penetration testing techniques in a highly secured environment.By the end of this Kali Linux book, you'll have gained the skills to perform advanced penetration testing on enterprise networks using Kali Linux.What you will learnExplore the fundamentals of ethical hackingUnderstand how to install and configure Kali LinuxPerform asset and network discovery techniquesFocus on how to perform vulnerability assessmentsExploit the trust in Active Directory domain servicesPerform advanced exploitation with Command and Control (C2) techniquesImplement advanced wireless hacking techniquesBecome well-versed with exploiting vulnerable web applicationsWho this book is forThis pentesting book is for students, trainers, cybersecurity professionals, cyber enthusiasts, network security professionals, ethical hackers, penetration testers, and security engineers. If you do not have any prior knowledge and are looking to become an expert in penetration testing using the Kali Linux operating system (OS), then this book is for you. Nombre d'accès : Illimité En ligne : http://library.ez.neoma-bs.fr/login?url=https://www.scholarvox.com/book/88926103 Permalink : https://cataloguelibrary.neoma-bs.fr/index.php?lvl=notice_display&id=542998 Cisco Certified CyberOps Associate 200-201 Certification Guide / Glen D. SINGH / PACKT PUBLISHING (2021)
Titre : Cisco Certified CyberOps Associate 200-201 Certification Guide Type de document : e-book Auteurs : Glen D. SINGH Editeur : PACKT PUBLISHING Année de publication : 2021 ISBN/ISSN/EAN : 9781800560871 Note générale : copyrighted Langues : Anglais (eng) Résumé : Begin a successful career in cybersecurity operations by achieving Cisco Certified CyberOps Associate 200-201 certificationKey FeaturesReceive expert guidance on how to kickstart your career in the cybersecurity industryGain hands-on experience while studying for the Cisco Certified CyberOps Associate certification examWork through practical labs and exercises mapped directly to the exam objectivesBook DescriptionAchieving the Cisco Certified CyberOps Associate 200-201 certification helps you to kickstart your career in cybersecurity operations. This book offers up-to-date coverage of 200-201 exam resources to fully equip you to pass on your first attempt. The book covers the essentials of network security concepts and shows you how to perform security threat monitoring. You'll begin by gaining an in-depth understanding of cryptography and exploring the methodology for performing both host and network-based intrusion analysis. Next, you'll learn about the importance of implementing security management and incident response strategies in an enterprise organization. As you advance, you'll see why implementing defenses is necessary by taking an in-depth approach, and then perform security monitoring and packet analysis on a network. You'll also discover the need for computer forensics and get to grips with the components used to identify network intrusions. Finally, the book will not only help you to learn the theory but also enable you to gain much-needed practical experience for the cybersecurity industry. By the end of this Cisco cybersecurity book, you'll have covered everything you need to pass the Cisco Certified CyberOps Associate 200-201 certification exam, and have a handy, on-the-job desktop reference guide.What you will learnIncorporate security into your architecture to prevent attacksDiscover how to implement and prepare secure designsIdentify access control models for digital assetsIdentify point of entry, determine scope, contain threats, and remediateFind out how to perform malware analysis and interpretationImplement security technologies to detect and analyze threatsWho this book is forThis book is for students who want to pursue a career in cybersecurity operations, threat detection and analysis, and incident response. IT professionals, network security engineers, security operations center (SOC) engineers, and cybersecurity analysts looking for a career boost and those looking to get certified in Cisco cybersecurity technologies and break into the cybersecurity industry will also benefit from this book. No prior knowledge of IT networking and cybersecurity industries is needed. Nombre d'accès : Illimité En ligne : http://library.ez.neoma-bs.fr/login?url=https://www.scholarvox.com/book/88914904 Permalink : https://cataloguelibrary.neoma-bs.fr/index.php?lvl=notice_display&id=535134 Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide / Glen D. SINGH / PACKT PUBLISHING (2020)
Titre : Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide Type de document : e-book Auteurs : Glen D. SINGH Editeur : PACKT PUBLISHING Année de publication : 2020 ISBN/ISSN/EAN : 9781800208094 Note générale : copyrighted Langues : Anglais (eng) Résumé : Prepare to take the Cisco Certified Network Associate (200-301 CCNA) exam and get to grips with the essentials of networking, security, and automationKey FeaturesSecure your future in network engineering with this intensive boot camp-style certification guideGain knowledge of the latest trends in Cisco networking and security and boost your career prospectsDesign and implement a wide range of networking technologies and services using Cisco solutionsBook DescriptionIn the dynamic technology landscape, staying on top of the latest technology trends is a must, especially if you want to build a career in network administration. Achieving CCNA 200-301 certification will validate your knowledge of networking concepts, and this book will help you to do just that. This exam guide focuses on the fundamentals to help you gain a high-level understanding of networking, security, IP connectivity, IP services, programmability, and automation. Starting with the functions of various networking components, you'll discover how they are used to build and improve an enterprise network. You'll then delve into configuring networking devices using a command-line interface (CLI) to provide network access, services, security, connectivity, and management. The book covers important aspects of network engineering using a variety of hands-on labs and real-world scenarios that will help you gain essential practical skills. As you make progress, this CCNA certification study guide will help you get to grips with the solutions and technologies that you need to implement and administer a broad range of modern networks and IT infrastructures. By the end of this book, you'll have gained the confidence to pass the Cisco CCNA 200-301 exam on the first attempt and be well-versed in a variety of network administration and security engineering solutions.What you will learnUnderstand the benefits of creating an optimal networkCreate and implement IP schemes in an enterprise networkDesign and implement virtual local area networks (VLANs)Administer dynamic routing protocols, network security, and automationGet to grips with various IP services that are essential to every networkDiscover how to troubleshoot networking devicesWho this book is forThis guide is for IT professionals looking to boost their network engineering and security administration career prospects. If you want to gain a Cisco CCNA certification and start a career as a network security professional, you'll find this book useful. Although no knowledge about Cisco technologies is expected, a basic understanding of industry-level network fundamentals will help you grasp the topics covered easily. Nombre d'accès : Illimité En ligne : http://library.ez.neoma-bs.fr/login?url=https://www.scholarvox.com/book/88913153 Permalink : https://cataloguelibrary.neoma-bs.fr/index.php?lvl=notice_display&id=534579 Permalink
LIBRARY - Campus Rouen
NEOMA Business School
pmb
-
59 Rue Taittinger, 51100 Reims
-
00 33 (0)3 26 77 46 15
Library Campus Reims
-
1 Rue du Maréchal Juin, BP 215
76825 Mont Saint Aignan cedex -
00 33 (0)2 32 82 58 26