Ethical Hacking: Techniques, Tools, and Countermeasures, Fourth Edition

  • 9h 50m
  • Michael G. Solomon, Sean-Philip Oriyano
  • Jones and Bartlett Learning
  • 2024

Ethical Hacking: Techniques, Tools, and Countermeasures, Fourth Edition, covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. Written by subject matter experts, with numerous real-world examples, the Fourth Edition provides readers with a clear, comprehensive introduction to the many threats on the security of our cyber environments and what can be done to combat them.

The text begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Part II provides a technical overview of hacking: how attackers target cyber resources and the methodologies they follow. Part III studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on distributed devices.

Features and Benefits

  • Available with cybersecurity Cloud Labs which provide a hands-on, immersive mock IT infrastructure enabling students to test their skills with realistic security scenarios
  • New mapping to CompTIA's PenTest+
  • Includes the latest content and tactics related to hacking, pen testing basics, and its methodology
  • Discusses hacking from both perspectives: the hacker and the defender
  • Coverage of the Internet of Things and how it has expanded attack surfaces
  • Instructor resources include an Instructor Guide, slides in PowerPoint format, Test Bank, Sample Syllabi, Time on Task Documentation, and Content Map

About the Author

Michael G. Solomon, PhD, CISSP, PMP, CISM - Professor, University of the Cumberlands

Michael G. Solomon, PhD, CISSP, PMP, CISM, CySA+, Pentest+, is an author, educator, and consultant focusing on privacy, security, blockchain, and identity management. As an IT professional and consultant since 1987, Dr. Solomon has led project teams for many Fortune 500 companies and has authored and contributed to more than 30 books and numerous training courses. Dr. Solomon is a Professor of Computer and Information Sciences at the University of the Cumberlands and holds a Ph.D. in Computer Science and Informatics from Emory University.

Sean-Philip Oriyano

Sean-Philip Oriyano has been actively working in the IT field since 1990. Throughout his career, he has held positions such as support specialist to consultants and senior instructor. Currently he is an IT instructor who specializes in infrastructure and security topics for various public and private entities. Sean has instructed for the US Air Force, Navy, and Army at locations both in North America and internationally. Sean is certified as a CISSP, CHFI, CEH, CEI, CNDA, SCNP, SCPI, MCT, MCSE, and MCITP, and he is a member of EC-Council, ISSA, Elearning Guild, and Infragard.

In this Book

  • Hacking: The Next Generation
  • Linux and Penetration Testing
  • TCP/IP Review
  • Cryptographic Concepts
  • Passive Reconnaissance
  • Active Reconnaissance
  • Enumeration and Exploitation
  • Malware
  • Web and Database Attacks
  • Sniffers, Session Hijacking, and Denial of Service Attacks
  • Wireless Vulnerabilities
  • Social Engineering
  • Defensive Techniques
  • Defensive Tools
  • Physical Security
  • References
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.4 of 7 users Rating 4.4 of 7 users (7)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)