Network vulnerability assessment :: identify security loopholes in your network's infrastructure /

Exercises; Chapter 2: Setting Up the Assessment Environment; Setting up a Kali virtual machine; Basics of Kali Linux; Environment configuration and setup; Web server; Secure Shell (SSH); File Transfer Protocol (FTP); Software management; List of tools to be used during assessment; Summary; Chapter 3...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Rahalkar, Sagar (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Birmingham, UK : Packt Publishing, 2018.
Schlagworte:
Online-Zugang:Volltext
Zusammenfassung:Exercises; Chapter 2: Setting Up the Assessment Environment; Setting up a Kali virtual machine; Basics of Kali Linux; Environment configuration and setup; Web server; Secure Shell (SSH); File Transfer Protocol (FTP); Software management; List of tools to be used during assessment; Summary; Chapter 3: Security Assessment Prerequisites; Target scoping and planning; Gathering requirements; Preparing a detailed checklist of test requirements; Suitable time frame and testing hours; Identifying stakeholders; Deciding upon the type of vulnerability assessment.
Being able to identify security loopholes has become critical to many businesses. That's where learning network security assessment becomes very important. This book will not only show you how to find out the system vulnerabilities but also help you build a network security threat model.
Beschreibung:1 online resource (1 volume) : illustrations
ISBN:9781788624725
1788624726

Es ist kein Print-Exemplar vorhanden.

Volltext öffnen