Cybersecurity attacks (Red Team activity)
"There is only way to become really good at cybersecurity: you must know both how to attack and how to defend. First of all, you have to learn to think like a hacker, so you deeply understand what the threats are. Then you'll need to know how to protect yourself from the attacks. We start...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch Video |
Sprache: | English |
Veröffentlicht: |
[Place of publication not identified]
Packt
[2018]
|
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cgm a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047715928 | ||
003 | DE-627-1 | ||
005 | 20240228120448.0 | ||
006 | m o | | | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2018 xx ||| |o o ||eng c | ||
035 | |a (DE-627-1)047715928 | ||
035 | |a (DE-599)KEP047715928 | ||
035 | |a (ORHE)9781788478878 | ||
035 | |a (DE-627-1)047715928 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
100 | 1 | |a Nesterenko, Sergii |e RednerIn |4 spk | |
245 | 1 | 0 | |a Cybersecurity attacks (Red Team activity) |c Sergii Nesterenko |
264 | 1 | |a [Place of publication not identified] |b Packt |c [2018] | |
300 | |a 1 online resource (1 streaming video file (3 hr., 35 min., 31 sec.)) | ||
336 | |a zweidimensionales bewegtes Bild |b tdi |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Title from title screen (viewed March 20, 2018). - Date of publication from resource description page | ||
520 | |a "There is only way to become really good at cybersecurity: you must know both how to attack and how to defend. First of all, you have to learn to think like a hacker, so you deeply understand what the threats are. Then you'll need to know how to protect yourself from the attacks. We start with precise descriptions and examples of network attacks to show you how the malicious hackers can break into your network--and what harm they can do. Then we'll look at another attack vector: websites and web-applications. You'll see the most vulnerable places and understand what cybercriminals will do if they find them. Then we'll discover the third vector of attacks: humans. Refined hackers know how to hack a human brain first to hack digital assets. You'll find out what social engineering, phishing, and spear-phishings, and why they're becoming especially dangerous today. By the end of this course, you'll be able to locate all your vulnerabilities and remediate them before malicious hackers find and exploit them."--Resource description page | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computer security | |
650 | 0 | |a Computer crimes | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Criminalité informatique | |
650 | 4 | |a Computer crimes |0 (OCoLC)fst00872063 | |
650 | 4 | |a Computer networks ; Security measures |0 (OCoLC)fst00872341 | |
650 | 4 | |a Computer security |0 (OCoLC)fst00872484 | |
650 | 4 | |a Electronic videos | |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781788478878/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
935 | |c vide | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047715928 |
---|---|
_version_ | 1818767388939649024 |
adam_text | |
any_adam_object | |
author2 | Nesterenko, Sergii |
author2_role | spk |
author2_variant | s n sn |
author_facet | Nesterenko, Sergii |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047715928 (DE-599)KEP047715928 (ORHE)9781788478878 |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02733cgm a22004572 4500</leader><controlfield tag="001">ZDB-30-ORH-047715928</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120448.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2018 xx ||| |o o ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047715928</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047715928</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781788478878</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047715928</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Nesterenko, Sergii</subfield><subfield code="e">RednerIn</subfield><subfield code="4">spk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity attacks (Red Team activity)</subfield><subfield code="c">Sergii Nesterenko</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Packt</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 streaming video file (3 hr., 35 min., 31 sec.))</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from title screen (viewed March 20, 2018). - Date of publication from resource description page</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"There is only way to become really good at cybersecurity: you must know both how to attack and how to defend. First of all, you have to learn to think like a hacker, so you deeply understand what the threats are. Then you'll need to know how to protect yourself from the attacks. We start with precise descriptions and examples of network attacks to show you how the malicious hackers can break into your network--and what harm they can do. Then we'll look at another attack vector: websites and web-applications. You'll see the most vulnerable places and understand what cybercriminals will do if they find them. Then we'll discover the third vector of attacks: humans. Refined hackers know how to hack a human brain first to hack digital assets. You'll find out what social engineering, phishing, and spear-phishings, and why they're becoming especially dangerous today. By the end of this course, you'll be able to locate all your vulnerabilities and remediate them before malicious hackers find and exploit them."--Resource description page</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="0">(OCoLC)fst00872063</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield><subfield code="0">(OCoLC)fst00872341</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="0">(OCoLC)fst00872484</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic videos</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781788478878/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047715928 |
illustrated | Not Illustrated |
indexdate | 2024-12-18T08:49:06Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (1 streaming video file (3 hr., 35 min., 31 sec.)) |
psigel | ZDB-30-ORH |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Packt |
record_format | marc |
spelling | Nesterenko, Sergii RednerIn spk Cybersecurity attacks (Red Team activity) Sergii Nesterenko [Place of publication not identified] Packt [2018] 1 online resource (1 streaming video file (3 hr., 35 min., 31 sec.)) zweidimensionales bewegtes Bild tdi rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Title from title screen (viewed March 20, 2018). - Date of publication from resource description page "There is only way to become really good at cybersecurity: you must know both how to attack and how to defend. First of all, you have to learn to think like a hacker, so you deeply understand what the threats are. Then you'll need to know how to protect yourself from the attacks. We start with precise descriptions and examples of network attacks to show you how the malicious hackers can break into your network--and what harm they can do. Then we'll look at another attack vector: websites and web-applications. You'll see the most vulnerable places and understand what cybercriminals will do if they find them. Then we'll discover the third vector of attacks: humans. Refined hackers know how to hack a human brain first to hack digital assets. You'll find out what social engineering, phishing, and spear-phishings, and why they're becoming especially dangerous today. By the end of this course, you'll be able to locate all your vulnerabilities and remediate them before malicious hackers find and exploit them."--Resource description page Computer networks Security measures Computer security Computer crimes Computer Security Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Criminalité informatique Computer crimes (OCoLC)fst00872063 Computer networks ; Security measures (OCoLC)fst00872341 Computer security (OCoLC)fst00872484 Electronic videos TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781788478878/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Cybersecurity attacks (Red Team activity) Computer networks Security measures Computer security Computer crimes Computer Security Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Criminalité informatique Computer crimes (OCoLC)fst00872063 Computer networks ; Security measures (OCoLC)fst00872341 Computer security (OCoLC)fst00872484 Electronic videos |
subject_GND | (OCoLC)fst00872063 (OCoLC)fst00872341 (OCoLC)fst00872484 |
title | Cybersecurity attacks (Red Team activity) |
title_auth | Cybersecurity attacks (Red Team activity) |
title_exact_search | Cybersecurity attacks (Red Team activity) |
title_full | Cybersecurity attacks (Red Team activity) Sergii Nesterenko |
title_fullStr | Cybersecurity attacks (Red Team activity) Sergii Nesterenko |
title_full_unstemmed | Cybersecurity attacks (Red Team activity) Sergii Nesterenko |
title_short | Cybersecurity attacks (Red Team activity) |
title_sort | cybersecurity attacks red team activity |
topic | Computer networks Security measures Computer security Computer crimes Computer Security Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Criminalité informatique Computer crimes (OCoLC)fst00872063 Computer networks ; Security measures (OCoLC)fst00872341 Computer security (OCoLC)fst00872484 Electronic videos |
topic_facet | Computer networks Security measures Computer security Computer crimes Computer Security Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Criminalité informatique Computer networks ; Security measures Electronic videos |
url | https://learning.oreilly.com/library/view/-/9781788478878/?ar |
work_keys_str_mv | AT nesterenkosergii cybersecurityattacksredteamactivity |