Cybersecurity Attacks (Red Team Activity) [Video]

Cybersecurity Attacks (Red Team Activity) [Video]

Sergii Nesterenko

Learn about the different kinds of cyber attacks and how they can be executed
Packt Subscription
$5.00
$9.99/m after first month
Video
$5.00
RRP $124.99
Save 95%
What do I get with a Packt subscription?
  • Exclusive monthly discount - no contract
  • Unlimited access to entire Packt library of 6500+ eBooks and Videos
  • 120 new titles added every month, on new and emerging tech
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the subscription reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the subscription reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the subscription reader
$5.00
$5.00
$9.99/m after first month
RRP $124.99
Subscription
Video
Subscribe Now

Frequently bought together


Cybersecurity Attacks (Red Team Activity) [Video] Book Cover
Cybersecurity Attacks (Red Team Activity) [Video]
$ 124.99
$ 5.00
Cybersecurity: Methods of Protection (Blue Team Activity) [Video] Book Cover
Cybersecurity: Methods of Protection (Blue Team Activity) [Video]
$ 124.99
$ 5.00
Buy 2 for $10.00
Save $239.98
Add to Cart

Video Details

ISBN 13 9781788478878
Course Length 3 hours 35 minutes

Video Description

There is only way to become really good at cybersecurity: you must know both how to attack and how to defend. First of all, you have to learn to think like a hacker, so you deeply understand what the threats are. Then you’ll need to know how to protect yourself from the attacks. We start with precise descriptions and examples of network attacks to show you how the malicious hackers can break into your network—and what harm they can do. Then we’ll look at another attack vector: websites and web-applications. You’ll see the most vulnerable places and understand what cybercriminals will do if they find them.Then we’ll discover the third vector of attacks: humans.

Refined hackers know how to hack a human brain first to hack digital assets. You’ll find out what social engineering, phishing, and spear-phishings, and why they’re becoming especially dangerous today.By the end of this course, you’ll be able to locate all your vulnerabilities and remediate them before malicious hackers find and exploit them

Style and Approach

This course has a 90% hands-on approach. We show hackers’ techniques in details from a to z. Just complete every exercise with the author to get new thrilling skills!

Video Preview

What You Will Learn

  • See different types of cyber attacks, how they are executed, and to provide vulnerability assessment
  • Explore the technology of cyber espionage and quickly discover upcoming cyber attacks
  • Use Kali Linux, Metasploit, Owasp ZAP, BurpSuite, Maltego, and a lot of other first-class tools for ethical hacking
  • Deal with hackers that manipulate the human mind and behaviour to break into your assets
  • See how email and social media accounts can become your enemy
  • Know how cybercriminals can control your browser and what they can do with it
  • See how SQL injection and XSS play a vital role in the modern cybersecurity field and why they’re so dangerous
  • Use Python for penetration testing

Authors

Video Details

ISBN 139781788478878
Course Length3 hours 35 minutes
Read More

Read More Reviews

Recommended for You

Cybersecurity: Methods of Protection (Blue Team Activity) [Video] Book Cover
Cybersecurity: Methods of Protection (Blue Team Activity) [Video]
$ 124.99
$ 5.00
YOLO v3 - Robust Deep Learning Object Detection in 1 Hour [Video] Book Cover
YOLO v3 - Robust Deep Learning Object Detection in 1 Hour [Video]
$ 179.99
$ 5.01
BDD in C# - Using Specflow (Cucumber) to Develop a REST API and Automate Software Testing [Video] Book Cover
BDD in C# - Using Specflow (Cucumber) to Develop a REST API and Automate Software Testing [Video]
$ 48.99
$ 5.00
Pica8 WhiteBox Switching, SDN and OpenFlow Fundamentals [Video] Book Cover
Pica8 WhiteBox Switching, SDN and OpenFlow Fundamentals [Video]
$ 17.99
$ 5.00
Cisco CCENT Packet Tracer Ultimate Labs: ICND1 Exam Preparation Labs [Video] Book Cover
Cisco CCENT Packet Tracer Ultimate Labs: ICND1 Exam Preparation Labs [Video]
$ 19.99
$ 5.00
The Complete MySQL Developer Course [Video] Book Cover
The Complete MySQL Developer Course [Video]
$ 158.99
$ 5.00