Introduction to penetration testing finding and analyzing vulnerabilities in systems and networks with Kali Linux

"In this Introduction to Penetration Testing training course, expert author Ric Messier will teach you how to find and analyze vulnerabilities in systems and networks with Kali Linux. This course is designed for the absolute beginner, meaning no penetration testing experience is required. You w...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Weitere Verfasser: Messier, Ric (RednerIn)
Format: Elektronisch Video
Sprache:English
Veröffentlicht: [Place of publication not identified] O'Reilly 2015
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cgm a22000002 4500
001 ZDB-30-ORH-047673796
003 DE-627-1
005 20240228120027.0
006 m o | |
007 cr uuu---uuuuu
008 191023s2015 xx ||| |o o ||eng c
035 |a (DE-627-1)047673796 
035 |a (DE-599)KEP047673796 
035 |a (ORHE)9781771375245 
035 |a (DE-627-1)047673796 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 005.8  |2 23/eng/20230216 
100 1 |a Messier, Ric  |e RednerIn  |4 spk 
245 1 0 |a Introduction to penetration testing  |b finding and analyzing vulnerabilities in systems and networks with Kali Linux  |c with Ric Messier 
264 1 |a [Place of publication not identified]  |b O'Reilly  |c 2015 
300 |a 1 online resource (1 streaming video file (4 hr., 25 min., 13 sec.))  |b digital, sound, color 
336 |a zweidimensionales bewegtes Bild  |b tdi  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Title from title screen (viewed January 11, 2016). - Date of publication from resource description page 
520 |a "In this Introduction to Penetration Testing training course, expert author Ric Messier will teach you how to find and analyze vulnerabilities in systems and networks with Kali Linux. This course is designed for the absolute beginner, meaning no penetration testing experience is required. You will start by learning about reconnaissance, including DNS, using job sites, social networking investigation, and using Wireshark filters. From there, Ric will teach you about scanning and vulnerability analysis, including setting up and starting an OpenVAS scan, ExploitDB, and vulnerability research using CVEs. This video tutorial also covers Metasploit, including adding hosts to the database, using Metasploit for scans, and exploits with Metasploit. Finally, you will learn about website testing. Once you have completed this computer based training course, you will have learned how to find and analyze vulnerabilities in systems and networks with Kali Linux."--Resource description page. 
630 2 0 |a Kali Linux 
650 0 |a Penetration testing (Computer security) 
650 0 |a Computer security  |x Evaluation 
650 0 |a Computer software  |x Testing 
650 4 |a Kali Linux  |0 (OCoLC)fst01914587 
650 4 |a Tests d'intrusion 
650 4 |a Sécurité informatique ; Évaluation 
650 4 |a Computer security ; Evaluation  |0 (OCoLC)fst00872488 
650 4 |a Computer software ; Testing  |0 (OCoLC)fst00872601 
650 4 |a Penetration testing (Computer security)  |0 (OCoLC)fst01789566 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781771375245/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
935 |c vide 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-047673796
_version_ 1818767389132587009
adam_text
any_adam_object
author2 Messier, Ric
author2_role spk
author2_variant r m rm
author_facet Messier, Ric
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)047673796
(DE-599)KEP047673796
(ORHE)9781771375245
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
Video
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02808cgm a22004572 4500</leader><controlfield tag="001">ZDB-30-ORH-047673796</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120027.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2015 xx ||| |o o ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047673796</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047673796</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781771375245</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047673796</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20230216</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Messier, Ric</subfield><subfield code="e">RednerIn</subfield><subfield code="4">spk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Introduction to penetration testing</subfield><subfield code="b">finding and analyzing vulnerabilities in systems and networks with Kali Linux</subfield><subfield code="c">with Ric Messier</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">O'Reilly</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 streaming video file (4 hr., 25 min., 13 sec.))</subfield><subfield code="b">digital, sound, color</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from title screen (viewed January 11, 2016). - Date of publication from resource description page</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"In this Introduction to Penetration Testing training course, expert author Ric Messier will teach you how to find and analyze vulnerabilities in systems and networks with Kali Linux. This course is designed for the absolute beginner, meaning no penetration testing experience is required. You will start by learning about reconnaissance, including DNS, using job sites, social networking investigation, and using Wireshark filters. From there, Ric will teach you about scanning and vulnerability analysis, including setting up and starting an OpenVAS scan, ExploitDB, and vulnerability research using CVEs. This video tutorial also covers Metasploit, including adding hosts to the database, using Metasploit for scans, and exploits with Metasploit. Finally, you will learn about website testing. Once you have completed this computer based training course, you will have learned how to find and analyze vulnerabilities in systems and networks with Kali Linux."--Resource description page.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Kali Linux</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Evaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer software</subfield><subfield code="x">Testing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kali Linux</subfield><subfield code="0">(OCoLC)fst01914587</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Évaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security ; Evaluation</subfield><subfield code="0">(OCoLC)fst00872488</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer software ; Testing</subfield><subfield code="0">(OCoLC)fst00872601</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="0">(OCoLC)fst01789566</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781771375245/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-047673796
illustrated Not Illustrated
indexdate 2024-12-18T08:49:06Z
institution BVB
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (1 streaming video file (4 hr., 25 min., 13 sec.)) digital, sound, color
psigel ZDB-30-ORH
publishDate 2015
publishDateSearch 2015
publishDateSort 2015
publisher O'Reilly
record_format marc
spelling Messier, Ric RednerIn spk
Introduction to penetration testing finding and analyzing vulnerabilities in systems and networks with Kali Linux with Ric Messier
[Place of publication not identified] O'Reilly 2015
1 online resource (1 streaming video file (4 hr., 25 min., 13 sec.)) digital, sound, color
zweidimensionales bewegtes Bild tdi rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Title from title screen (viewed January 11, 2016). - Date of publication from resource description page
"In this Introduction to Penetration Testing training course, expert author Ric Messier will teach you how to find and analyze vulnerabilities in systems and networks with Kali Linux. This course is designed for the absolute beginner, meaning no penetration testing experience is required. You will start by learning about reconnaissance, including DNS, using job sites, social networking investigation, and using Wireshark filters. From there, Ric will teach you about scanning and vulnerability analysis, including setting up and starting an OpenVAS scan, ExploitDB, and vulnerability research using CVEs. This video tutorial also covers Metasploit, including adding hosts to the database, using Metasploit for scans, and exploits with Metasploit. Finally, you will learn about website testing. Once you have completed this computer based training course, you will have learned how to find and analyze vulnerabilities in systems and networks with Kali Linux."--Resource description page.
Kali Linux
Penetration testing (Computer security)
Computer security Evaluation
Computer software Testing
Kali Linux (OCoLC)fst01914587
Tests d'intrusion
Sécurité informatique ; Évaluation
Computer security ; Evaluation (OCoLC)fst00872488
Computer software ; Testing (OCoLC)fst00872601
Penetration testing (Computer security) (OCoLC)fst01789566
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781771375245/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Introduction to penetration testing finding and analyzing vulnerabilities in systems and networks with Kali Linux
Kali Linux
Penetration testing (Computer security)
Computer security Evaluation
Computer software Testing
Kali Linux (OCoLC)fst01914587
Tests d'intrusion
Sécurité informatique ; Évaluation
Computer security ; Evaluation (OCoLC)fst00872488
Computer software ; Testing (OCoLC)fst00872601
Penetration testing (Computer security) (OCoLC)fst01789566
subject_GND (OCoLC)fst01914587
(OCoLC)fst00872488
(OCoLC)fst00872601
(OCoLC)fst01789566
title Introduction to penetration testing finding and analyzing vulnerabilities in systems and networks with Kali Linux
title_auth Introduction to penetration testing finding and analyzing vulnerabilities in systems and networks with Kali Linux
title_exact_search Introduction to penetration testing finding and analyzing vulnerabilities in systems and networks with Kali Linux
title_full Introduction to penetration testing finding and analyzing vulnerabilities in systems and networks with Kali Linux with Ric Messier
title_fullStr Introduction to penetration testing finding and analyzing vulnerabilities in systems and networks with Kali Linux with Ric Messier
title_full_unstemmed Introduction to penetration testing finding and analyzing vulnerabilities in systems and networks with Kali Linux with Ric Messier
title_short Introduction to penetration testing
title_sort introduction to penetration testing finding and analyzing vulnerabilities in systems and networks with kali linux
title_sub finding and analyzing vulnerabilities in systems and networks with Kali Linux
topic Kali Linux
Penetration testing (Computer security)
Computer security Evaluation
Computer software Testing
Kali Linux (OCoLC)fst01914587
Tests d'intrusion
Sécurité informatique ; Évaluation
Computer security ; Evaluation (OCoLC)fst00872488
Computer software ; Testing (OCoLC)fst00872601
Penetration testing (Computer security) (OCoLC)fst01789566
topic_facet Kali Linux
Penetration testing (Computer security)
Computer security Evaluation
Computer software Testing
Tests d'intrusion
Sécurité informatique ; Évaluation
Computer security ; Evaluation
Computer software ; Testing
url https://learning.oreilly.com/library/view/-/9781771375245/?ar
work_keys_str_mv AT messierric introductiontopenetrationtestingfindingandanalyzingvulnerabilitiesinsystemsandnetworkswithkalilinux