1 option
Cybersecurity Attacks (Red Team Activity) / Nesterenkos, Sergii.
- Format:
- Video
- Author/Creator:
- Nesterenkos, Sergii, author.
- Language:
- English
- Subjects (All):
- Computer networks--Security measures.
- Computer networks.
- Computer security.
- Computer crimes.
- Genre:
- Electronic videos.
- Physical Description:
- 1 online resource (1 video file, approximately 3 hr., 36 min.)
- Edition:
- 1st edition
- Place of Publication:
- Packt Publishing, 2018.
- System Details:
- video file
- Summary:
- Learn about the different kinds of cyber attacks and how they can be executed About This Video A comprehensive and easy-to-use guide to help you get a deep understanding of the most common cyber attacks in the quickest way It includes a wide range of hacker techniques and shows them in detail It uncovers a lot of professional secrets that hackers don’t want you to know In Detail There is only way to become really good at cybersecurity: you must know both how to attack and how to defend. First of all, you have to learn to think like a hacker, so you deeply understand what the threats are. Then you’ll need to know how to protect yourself from the attacks. We start with precise descriptions and examples of network attacks to show you how the malicious hackers can break into your network—and what harm they can do. Then we’ll look at another attack vector: websites and web-applications. You’ll see the most vulnerable places and understand what cybercriminals will do if they find them.Then we’ll discover the third vector of attacks: humans. Refined hackers know how to hack a human brain first to hack digital assets. You’ll find out what social engineering, phishing, and spear-phishings, and why they’re becoming especially dangerous today.By the end of this course, you’ll be able to locate all your vulnerabilities and remediate them before malicious hackers find and exploit them
- Participant:
- Presenter, Sergii Nesterenko.
- Notes:
- Online resource; Title from title screen (viewed February 28, 2018)
- Title from title screen (viewed March 20, 2018).
- Date of publication from resource description page.
- OCLC:
- 1029302259
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.