Hacker Techniques, Tools, and Incident Handling, Second Edition

  • 8h 34m
  • Sean-Philip Oriyano
  • Jones and Bartlett Learning
  • 2014

PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES

Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling provides readers with a clear, comprehensive introduction to the many threats on our Internet environment and security and what can be done to combat them. Instructor Materials for Hacker Techniques, Tools, and Incident Handling include: PowerPoint Lecture Slides Exam Questions Case Scenarios/Handouts

About the Author

SEAN-PHILIP ORIYANO is a longtime veteran of the IT field who has worked in a wide variety of roles and specialties over the years. Currently he is an instructor, author, cyberwarfare expert, and security researcher. Over the years he has worked with many clients, including all branches of the U.S. military as well as several international clients. He has been invited to instruct at the U.S. Air Force Academy and Naval War College. He obtained his knowledge through a combination of apprenticeships and experience, obtaining more than 75 certifications and licenses along the way. He has also published seven bestselling books, made training videos, and authored a dozen research papers on topics such as hacking, forensics, and encryption. He continues to publish papers and books on a regular basis and enjoys sharing his knowledge and experience with others.

Outside his civilian duties he is also a member of the California State Military Reserve, where he is a warrant officer specializing in signals. He also spends time working with search and rescue efforts, plays ice hockey, and is a licensed pilot.

Oriyano currently holds the CISSP, CEH, and CHFI certifications, as well as multiple Microsoft and CompTIA certifications and a Senior MEMS rating.

In this Book

  • Hacking: The Next Generation
  • TCP/IP Review
  • Cryptographic Concepts
  • Physical Security
  • Footprinting Tools and Techniques
  • Port Scanning
  • Enumeration and Computer System Hacking
  • Wireless Vulnerabilities
  • Web and Database Attacks
  • Malware
  • Sniffers, Session Hijacking, and Denial of Service Attacks
  • Linux and Penetration Testing
  • Social Engineering
  • Incident Response
  • Defensive Technologies
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.6 of 239 users Rating 4.6 of 239 users (239)