Introduction to penetration testing finding and analyzing vulnerabilities in systems and networks with Kali Linux
"In this Introduction to Penetration Testing training course, expert author Ric Messier will teach you how to find and analyze vulnerabilities in systems and networks with Kali Linux. This course is designed for the absolute beginner, meaning no penetration testing experience is required. You w...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch Video |
Sprache: | English |
Veröffentlicht: |
[Place of publication not identified]
O'Reilly
2015
|
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cgm a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047673796 | ||
003 | DE-627-1 | ||
005 | 20240228120027.0 | ||
006 | m o | | | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2015 xx ||| |o o ||eng c | ||
035 | |a (DE-627-1)047673796 | ||
035 | |a (DE-599)KEP047673796 | ||
035 | |a (ORHE)9781771375245 | ||
035 | |a (DE-627-1)047673796 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20230216 | |
100 | 1 | |a Messier, Ric |e RednerIn |4 spk | |
245 | 1 | 0 | |a Introduction to penetration testing |b finding and analyzing vulnerabilities in systems and networks with Kali Linux |c with Ric Messier |
264 | 1 | |a [Place of publication not identified] |b O'Reilly |c 2015 | |
300 | |a 1 online resource (1 streaming video file (4 hr., 25 min., 13 sec.)) |b digital, sound, color | ||
336 | |a zweidimensionales bewegtes Bild |b tdi |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Title from title screen (viewed January 11, 2016). - Date of publication from resource description page | ||
520 | |a "In this Introduction to Penetration Testing training course, expert author Ric Messier will teach you how to find and analyze vulnerabilities in systems and networks with Kali Linux. This course is designed for the absolute beginner, meaning no penetration testing experience is required. You will start by learning about reconnaissance, including DNS, using job sites, social networking investigation, and using Wireshark filters. From there, Ric will teach you about scanning and vulnerability analysis, including setting up and starting an OpenVAS scan, ExploitDB, and vulnerability research using CVEs. This video tutorial also covers Metasploit, including adding hosts to the database, using Metasploit for scans, and exploits with Metasploit. Finally, you will learn about website testing. Once you have completed this computer based training course, you will have learned how to find and analyze vulnerabilities in systems and networks with Kali Linux."--Resource description page. | ||
630 | 2 | 0 | |a Kali Linux |
650 | 0 | |a Penetration testing (Computer security) | |
650 | 0 | |a Computer security |x Evaluation | |
650 | 0 | |a Computer software |x Testing | |
650 | 4 | |a Kali Linux |0 (OCoLC)fst01914587 | |
650 | 4 | |a Tests d'intrusion | |
650 | 4 | |a Sécurité informatique ; Évaluation | |
650 | 4 | |a Computer security ; Evaluation |0 (OCoLC)fst00872488 | |
650 | 4 | |a Computer software ; Testing |0 (OCoLC)fst00872601 | |
650 | 4 | |a Penetration testing (Computer security) |0 (OCoLC)fst01789566 | |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781771375245/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
935 | |c vide | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047673796 |
---|---|
_version_ | 1818767389132587009 |
adam_text | |
any_adam_object | |
author2 | Messier, Ric |
author2_role | spk |
author2_variant | r m rm |
author_facet | Messier, Ric |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047673796 (DE-599)KEP047673796 (ORHE)9781771375245 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02808cgm a22004572 4500</leader><controlfield tag="001">ZDB-30-ORH-047673796</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120027.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2015 xx ||| |o o ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047673796</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047673796</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781771375245</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047673796</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20230216</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Messier, Ric</subfield><subfield code="e">RednerIn</subfield><subfield code="4">spk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Introduction to penetration testing</subfield><subfield code="b">finding and analyzing vulnerabilities in systems and networks with Kali Linux</subfield><subfield code="c">with Ric Messier</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">O'Reilly</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 streaming video file (4 hr., 25 min., 13 sec.))</subfield><subfield code="b">digital, sound, color</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from title screen (viewed January 11, 2016). - Date of publication from resource description page</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"In this Introduction to Penetration Testing training course, expert author Ric Messier will teach you how to find and analyze vulnerabilities in systems and networks with Kali Linux. This course is designed for the absolute beginner, meaning no penetration testing experience is required. You will start by learning about reconnaissance, including DNS, using job sites, social networking investigation, and using Wireshark filters. From there, Ric will teach you about scanning and vulnerability analysis, including setting up and starting an OpenVAS scan, ExploitDB, and vulnerability research using CVEs. This video tutorial also covers Metasploit, including adding hosts to the database, using Metasploit for scans, and exploits with Metasploit. Finally, you will learn about website testing. Once you have completed this computer based training course, you will have learned how to find and analyze vulnerabilities in systems and networks with Kali Linux."--Resource description page.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Kali Linux</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Evaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer software</subfield><subfield code="x">Testing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kali Linux</subfield><subfield code="0">(OCoLC)fst01914587</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Évaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security ; Evaluation</subfield><subfield code="0">(OCoLC)fst00872488</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer software ; Testing</subfield><subfield code="0">(OCoLC)fst00872601</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="0">(OCoLC)fst01789566</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781771375245/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047673796 |
illustrated | Not Illustrated |
indexdate | 2024-12-18T08:49:06Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (1 streaming video file (4 hr., 25 min., 13 sec.)) digital, sound, color |
psigel | ZDB-30-ORH |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | O'Reilly |
record_format | marc |
spelling | Messier, Ric RednerIn spk Introduction to penetration testing finding and analyzing vulnerabilities in systems and networks with Kali Linux with Ric Messier [Place of publication not identified] O'Reilly 2015 1 online resource (1 streaming video file (4 hr., 25 min., 13 sec.)) digital, sound, color zweidimensionales bewegtes Bild tdi rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Title from title screen (viewed January 11, 2016). - Date of publication from resource description page "In this Introduction to Penetration Testing training course, expert author Ric Messier will teach you how to find and analyze vulnerabilities in systems and networks with Kali Linux. This course is designed for the absolute beginner, meaning no penetration testing experience is required. You will start by learning about reconnaissance, including DNS, using job sites, social networking investigation, and using Wireshark filters. From there, Ric will teach you about scanning and vulnerability analysis, including setting up and starting an OpenVAS scan, ExploitDB, and vulnerability research using CVEs. This video tutorial also covers Metasploit, including adding hosts to the database, using Metasploit for scans, and exploits with Metasploit. Finally, you will learn about website testing. Once you have completed this computer based training course, you will have learned how to find and analyze vulnerabilities in systems and networks with Kali Linux."--Resource description page. Kali Linux Penetration testing (Computer security) Computer security Evaluation Computer software Testing Kali Linux (OCoLC)fst01914587 Tests d'intrusion Sécurité informatique ; Évaluation Computer security ; Evaluation (OCoLC)fst00872488 Computer software ; Testing (OCoLC)fst00872601 Penetration testing (Computer security) (OCoLC)fst01789566 TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781771375245/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Introduction to penetration testing finding and analyzing vulnerabilities in systems and networks with Kali Linux Kali Linux Penetration testing (Computer security) Computer security Evaluation Computer software Testing Kali Linux (OCoLC)fst01914587 Tests d'intrusion Sécurité informatique ; Évaluation Computer security ; Evaluation (OCoLC)fst00872488 Computer software ; Testing (OCoLC)fst00872601 Penetration testing (Computer security) (OCoLC)fst01789566 |
subject_GND | (OCoLC)fst01914587 (OCoLC)fst00872488 (OCoLC)fst00872601 (OCoLC)fst01789566 |
title | Introduction to penetration testing finding and analyzing vulnerabilities in systems and networks with Kali Linux |
title_auth | Introduction to penetration testing finding and analyzing vulnerabilities in systems and networks with Kali Linux |
title_exact_search | Introduction to penetration testing finding and analyzing vulnerabilities in systems and networks with Kali Linux |
title_full | Introduction to penetration testing finding and analyzing vulnerabilities in systems and networks with Kali Linux with Ric Messier |
title_fullStr | Introduction to penetration testing finding and analyzing vulnerabilities in systems and networks with Kali Linux with Ric Messier |
title_full_unstemmed | Introduction to penetration testing finding and analyzing vulnerabilities in systems and networks with Kali Linux with Ric Messier |
title_short | Introduction to penetration testing |
title_sort | introduction to penetration testing finding and analyzing vulnerabilities in systems and networks with kali linux |
title_sub | finding and analyzing vulnerabilities in systems and networks with Kali Linux |
topic | Kali Linux Penetration testing (Computer security) Computer security Evaluation Computer software Testing Kali Linux (OCoLC)fst01914587 Tests d'intrusion Sécurité informatique ; Évaluation Computer security ; Evaluation (OCoLC)fst00872488 Computer software ; Testing (OCoLC)fst00872601 Penetration testing (Computer security) (OCoLC)fst01789566 |
topic_facet | Kali Linux Penetration testing (Computer security) Computer security Evaluation Computer software Testing Tests d'intrusion Sécurité informatique ; Évaluation Computer security ; Evaluation Computer software ; Testing |
url | https://learning.oreilly.com/library/view/-/9781771375245/?ar |
work_keys_str_mv | AT messierric introductiontopenetrationtestingfindingandanalyzingvulnerabilitiesinsystemsandnetworkswithkalilinux |