You must be logged in to post a review.
Academic book request
Inspection copies are available to lecturers and course leaders considering books for courses. If you teach a relevant course of 12 or more students, please complete the form below with your details. We also kindly request that you provide feedback on any textbook you receive within 60 days of receipt.
In-line with our Environmental Policy and to avoid unnecessary wastage, we provide digital access for inspection copy purposes. Print copies can be provided if books are adopted as course reading.
Please note that all requests are subject to our approval. Further details regarding our inspection copy service may be found HERE.
Ethical Hacking: Techniques, Tools, and Countermeasures
Authors: Michael G. Solomon, Sean-Philip OriyanoOVERVIEW
This product is available with Cybersecurity Cloud Labs, which provide a hands-on, immersive mock IT infrastructure enabling students to test their skills with realistic security scenarios.
Ethical Hacking: Techniques, Tools, and Countermeasures, Fourth Edition, covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. Written by subject matter experts, with numerous real-world examples, the Fourth Edition provides readers with a clear, comprehensive introduction to the many threats on the security of our cyber environments and what can be done to combat them.
The text begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Part II provides a technical overview of hacking: how attackers target cyber resources and the methodologies they follow. Part III studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on distributed devices.
Features and Benefits
- Available with cybersecurity Cloud Labs
- New mapping to CompTIA’s PenTest+
- Includes the latest content and tactics related to hacking, pen testing basics, and its methodology
- Discusses hacking from both perspectives: the hacker and the defender
- Coverage of the Internet of Things and how it has expanded attack surfaces
- Instructor resources include an Instructor Guide, slides in PowerPoint format, Test Bank, Sample Syllabi, Time on Task Documentation, and Content Map
TABLE OF CONTENTS
- Part 1 Hacker Techniques and Tools
- Chapter 1 Hacking: The Next Generation
- Chapter 2 Linux and Penetration Testing
- Chapter 3 TCP/IP Review
- Chapter 4 Cryptographic Concepts
- Part 2 A Technical and Social Overview of Hacking
- Chapter 5 Passive Reconnaissance
- Chapter 6 Active Reconnaissance
- Chapter 7 Enumeration and Exploitation
- Chapter 8 Malware
- Chapter 9 Web and Database Attacks
- Chapter 10 Sniffers, Session Hijacking, and Denial of Service Attacks
- Chapter 11 Wireless Vulnerabilities
- Chapter 12 Social Engineering
- Part 3 Defensive Techniques and Tools
- Chapter 13 Defensive Techniques
- Chapter 14 Defensive Tools
- Chapter 15 Physical Security
Related Products
Our Reviews
Blog
Last Month's Bestseller
Ambulance Care Practice
Brought up-to-date with the latest guidance, research and policy, this second edition of Ambulance Care Practice is an essential guide for paramedic students, trainee associate ambulance practitioners, those studying towards...
ViewBecome a Class VIP!
Sign up to hear about new products, promotions and more! Plus, enjoy a 25% discount and free P&P each month!
Reviews
There are no reviews yet.