Ethical Hacking [Online Code]

Price: $49.99
Product prices and availability are accurate as of 2018-10-11 02:19:39 EDT and are subject to change. Any price and availability information displayed on http://www.amazon.com/ at the time of purchase will apply to the purchase of this product.
Availability: Not Available - stock arriving soon
CERTAIN CONTENT THAT APPEARS ON THIS SITE COMES FROM AMAZON SERVICES LLC. THIS CONTENT IS PROVIDED 'AS IS' AND IS SUBJECT TO CHANGE OR REMOVAL AT ANY TIME.

Manufacturer Description

Number of Videos: 5 hours - 89 lessons
Author:Ric Messier
User Level:Intermediate
Ethical hacking, or security testing, is the art and science of finding the flaws in an organization's network systems or web applications. Identifying those vulnerabilities can give the organization a fighting chance to fix them before the bad guys find them.

This course is a hands-on overview of the open source tools that information security professionals use to conduct professional caliber penetration tests. Prerequisites include a basic understanding of the ways network systems and operating systems work, basic familiarity with Linux, the ability to run virtual machines (VMWare, etc.) so you can set up attack systems and target systems, and a computer that's ready to run Kali Linux and Metasploit software.

  • Explore the concepts of security testing and the knowledge required to perform it
  • Understand reconnaissance and the publicly available tools used to gather information on potential targets
  • Discover the scanning techniques used to identify network systems' open ports
  • Learn to identify network system vulnerabilities and confirm their exploitability
  • Explore techniques for identifying web application vulnerabilities and attacks
  • Learn about client-side attacks and client-side attack tools
  • Gain hands-on experience using Metasploit penetration testing software

Ric Messier (GCIH, GSEC, CEH, CISSP) is the Director for Cyber Academic Programs at Circadence. He has decades of information security experience and is the author of dozens of O'Reilly titles on InfoSec and digital forensics, including "Introduction to Penetration Testing" and "Learning Linux Security". He holds degrees in Information Technology, Digital Forensic Science, and Information Assurance and Security.


Mac Minimum System Requirements:Mac Recommended System Requirements:
  • Processor:   Any
  • RAM:   Any
  • Hard Disk:   2GB
  • Video Card:   Any
  • Supported OS:   Mac El Capitan 10.11, Mac Yosemite 10.10, Mac Mavericks 10.9, Mac Mountain Lion 10.8, Mac Lion 10.7, Mac Snow Leopard 10.6, Mac Leopard 10.5, Mac OS X, Macintosh

    Product Features

    Learn Ethical Hacking from a professional trainer on your own time at your own desk. This visual training method offers users increased retention and accelerated learning. Breaks even the most complex applications down into simplistic steps

    Write a Review