Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Cybersecurity Attacks (Red Team Activity)
Cybersecurity Attacks (Red Team Activity)

Cybersecurity Attacks (Red Team Activity): Methods of cyber attacks, from the most popular to the advanced

Arrow left icon
Profile Icon Avinash Kadam Profile Icon Sergii Nesterenko
Arrow right icon
€114.99
Video Feb 2018 3hrs 35mins 1st Edition
Video
€114.99
Subscription
Free Trial
Renews at €18.99p/m
Arrow left icon
Profile Icon Avinash Kadam Profile Icon Sergii Nesterenko
Arrow right icon
€114.99
Video Feb 2018 3hrs 35mins 1st Edition
Video
€114.99
Subscription
Free Trial
Renews at €18.99p/m
Video
€114.99
Subscription
Free Trial
Renews at €18.99p/m

What do you get with a video?

Product feature icon Download this video in MP4 format
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want

Key benefits

  • A comprehensive and easy-to-use guide to help you get a deep understanding of the most common cyber attacks in the quickest way
  • It includes a wide range of hacker techniques and shows them in detail
  • It uncovers a lot of professional secrets that hackers don’t want you to know

Description

There is only way to become really good at cybersecurity: you must know both how to attack and how to defend. First of all, you have to learn to think like a hacker, so you deeply understand what the threats are. Then you’ll need to know how to protect yourself from the attacks. We start with precise descriptions and examples of network attacks to show you how the malicious hackers can break into your network—and what harm they can do. Then we’ll look at another attack vector: websites and web-applications. You’ll see the most vulnerable places and understand what cybercriminals will do if they find them.Then we’ll discover the third vector of attacks: humans. Refined hackers know how to hack a human brain first to hack digital assets. You’ll find out what social engineering, phishing, and spear-phishings, and why they’re becoming especially dangerous today.By the end of this course, you’ll be able to locate all your vulnerabilities and remediate them before malicious hackers find and exploit them. All the resource files are added to the GitHub repository at https://github.com/packtpublishing/cybersecurity-attacks-red-team-activity-

Who is this book for?

This course is for IT professionals who want to become cybersecurity-aware, Penetration Testers, System Administrators, Information Security Consultants, and everybody who wants to feel safe in the information field today. Prior knowledge in networking, web-application functioning, Linux command, and Python will be beneficial, throughout a short review of these topics will be given.

What you will learn

  • See different types of cyber attacks, how they are executed, and to provide vulnerability assessment
  • Explore the technology of cyber espionage and quickly discover upcoming cyber attacks
  • Use Kali Linux, Metasploit, Owasp ZAP, BurpSuite, Maltego, and a lot of other first-class tools for ethical hacking
  • Deal with hackers that manipulate the human mind and behaviour to break into your assets
  • See how email and social media accounts can become your enemy
  • Know how cybercriminals can control your browser and what they can do with it

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Feb 28, 2018
Length: 3hrs 35mins
Edition : 1st
Language : English
ISBN-13 : 9781788478878
Category :
Concepts :
Tools :

What do you get with a video?

Product feature icon Download this video in MP4 format
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want

Product Details

Publication date : Feb 28, 2018
Length: 3hrs 35mins
Edition : 1st
Language : English
ISBN-13 : 9781788478878
Category :
Concepts :
Tools :

Packt Subscriptions

See our plans and pricing
Modal Close icon
€18.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
€189.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts
€264.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total 176.97
Cybersecurity Attacks (Red Team Activity)
€114.99
Cybersecurity - Attack and Defense Strategies
€37.99
Cybersecurity: The Beginner's Guide
€23.99
Total 176.97 Stars icon

Table of Contents

4 Chapters
Building Our Lab Chevron down icon Chevron up icon
Attacking a Network Chevron down icon Chevron up icon
Website and Web-Application Attacks Chevron down icon Chevron up icon
Breaking the Human in a Cyber Crime Attack Chevron down icon Chevron up icon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How can I download a video package for offline viewing? Chevron down icon Chevron up icon
  1. Login to your account at Packtpub.com.
  2. Click on "My Account" and then click on the "My Videos" tab to access your videos.
  3. Click on the "Download Now" link to start your video download.
How can I extract my video file? Chevron down icon Chevron up icon

All modern operating systems ship with ZIP file extraction built in. If you'd prefer to use a dedicated compression application, we've tested WinRAR / 7-Zip for Windows, Zipeg / iZip / UnRarX for Mac and 7-Zip / PeaZip for Linux. These applications support all extension files.

How can I get help and support around my video package? Chevron down icon Chevron up icon

If your video course doesn't give you what you were expecting, either because of functionality problems or because the content isn't up to scratch, please mail customercare@packt.com with details of the problem. In addition, so that we can best provide the support you need, please include the following information for our support team.

  1. Video
  2. Format watched (HTML, MP4, streaming)
  3. Chapter or section that issue relates to (if relevant)
  4. System being played on
  5. Browser used (if relevant)
  6. Details of support
Why can’t I download my video package? Chevron down icon Chevron up icon

In the even that you are having issues downloading your video package then please follow these instructions:

  1. Disable all your browser plugins and extensions: Some security and download manager extensions can cause issues during the download.
  2. Download the video course using a different browser: We've tested downloads operate correctly in current versions of Chrome, Firefox, Internet Explorer, and Safari.