Learning Whitehat hacking and penetration testing / by Ric Messier.

"In this Whitehat Hacking and Penetration testing training course, expert Ric Messier covers the essentials you will need to know to harden and protect your hardware and software to avoid downtime and loss of data. Protecting your networks and customer data are more important that ever, and und...

Full description

Saved in:
Bibliographic Details
Online Access: Streaming Video (via O'Reilly/Safari)
Main Author: Messier, Ric
Format: Electronic Video
Language:English
Published: [Place of publication not identified] : InfiniteSkills, 2012.
Subjects:

MARC

LEADER 00000cgm a2200000 a 4500
001 b10286890
006 m o c
007 vz czazuu
007 cr |||||||||||
008 130314s2012 xx 624 o o vleng d
005 20240829142549.5
035 |a (OCoLC)safo830000283 
035 |a (OCoLC)830000283 
037 |a safo9781771370349 
040 |a UMI  |b eng  |e pn  |c UMI  |d OCLCF  |d OCLCQ  |d OCLCA  |d UAB  |d OCLCO  |d OCLCQ 
049 |a GWRE 
050 4 |a QA76.9.A25 
100 1 |a Messier, Ric. 
245 1 0 |a Learning Whitehat hacking and penetration testing /  |c by Ric Messier. 
260 |a [Place of publication not identified] :  |b InfiniteSkills,  |c 2012. 
300 |a 1 online resource (1 streaming video file (10 hr., 23 min., 34 sec.)) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Title from resource description page (viewed Mar. 14, 2013). 
511 0 |a Presenter, Ric Messier. 
520 |a "In this Whitehat Hacking and Penetration testing training course, expert Ric Messier covers the essentials you will need to know to harden and protect your hardware and software to avoid downtime and loss of data. Protecting your networks and customer data are more important that ever, and understanding HOW you are vulnerable is the best way to learn how you can prevent attacks. Some of the topics covered in this course are; researching and background information retrieval, networking fundamentals, a deeper look at TCP/IP and packets, as well as understanding cryptography. You will learn about scanning networks, penetration testing and the use of Metasploit, malware and viruses, DoS and DDoS attacks, web application hacking and securing wireless networks. Finally, you will learn about detection evasion and preventing programming attacks, and much more throughout this video based tutorial. By the time you have completed this video tutorial for Whitehat Hacking and Penetration testing, you will have a deeper understanding of the areas you may be potentially be vulnerable to attack in, as well as the methods that hackers use to exploit your systems, allowing you to better understand how to secure your hardware and data from unethical hackers."--Resource description page. 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
856 4 0 |u https://go.oreilly.com/UniOfColoradoBoulder/videos/~/9781771370349/?ar  |z Streaming Video (via O'Reilly/Safari) 
915 |a - 
956 |a O'Reilly-Safari eBooks 
956 |b O'Reilly Online Learning: Academic/Public Library Edition 
994 |a 92  |b COD 
998 |b Subsequent record output 
999 f f |i 32f7c112-c2a5-5e79-afe0-2088b7661eec  |s e15c0bac-1b07-5c14-bec9-52f6999459d1 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e QA76.9.A25  |h Library of Congress classification  |i web  |n 1