Hacking Luisterboek Tooltip A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test

Afbeeldingen

Artikel vergelijken

  • Engels
  • Digitaal luisterboek
  • 9781094224428
  • 09 september 2019
  • Speelduur: 02:21:22 minuten
Alle productspecificaties
  • Luisterboeken kunnen beluisterd worden in de bol.com Kobo app. Na synchronisatie zijn ze te vinden. Let op! Je kunt luisterboeken niet annuleren of retourneren.

Samenvatting

As we become more and more reliant on wireless networks to live and work, learning how to protect your system has become vital, if only to save yourself from the pain of identity theft, of all the problems caused by having your system hacked and your data stolen.

Thankfully, there is a solution and it lies in penetration testing. A form of ethical hacking, penetration testing is a skill that you should learn, especially wireless-penetration testing and this has become more important than ever as new ways are being discovered to break into WPA2-encrypted networks.

With Kali Linux, you have all the tools you need and in Hacking : A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing, you will learn, with detailed step-by-step practical examples how to protect your network from being hacked.

In this book, you'll learn:

  • How to set up a wireless lab to test your system
  • What the KRACK attack is
  • How to sniff out hidden networks, wireless packets and SSIDs
  • How to capture WPA-2 keys and crack them
  • How to attack a radius authentication system
  • How to sniff traffic on a wireless network
  • How to use stolen keys to decrypt encrypted traffic
  • What the Honeypot and Deauthentication attacks are
  • What Man-In-The-Middle and DoS attacks are
  • How to secure your own wireless network

What are you waiting for? Buy Now to get started today to learn how to protect your system from the latest and most sophisticated attacks.

Tracklist

Productspecificaties

Inhoud

Taal
en
Bindwijze
Digitaal luisterboek
Oorspronkelijke releasedatum
09 september 2019
Speelduur
02:21:22
Illustraties
Nee

Betrokkenen

Hoofdauteur
Peter Bradley
Verteller
Jim D Johnston
Hoofduitgeverij
Peter Bradley

Overige kenmerken

Studieboek
Ja

EAN

EAN
9781094224428
Nog geen reviews

Prijsinformatie en bestellen

De prijs van dit product is 7 euro en 99 cent.
Direct beschikbaar
Verkoop door bol
  • Kies uit meer dan 100.000 Nederlands- en Engelstalige luisterboeken
  • Download de speciale bol Kobo app
  • Luister je boek waar en wanneer je maar wilt – online en offline
  • Dag en nacht klantenservice
  • Veilig betalen
Houd er rekening mee dat je downloadartikelen niet kunt annuleren of retourneren. Bij nog niet verschenen producten kun je tot de verschijningsdatum annuleren.
Zie ook de retourvoorwaarden

Lijst met gekozen artikelen om te vergelijken

Vergelijk artikelen