Networks through the eyes of a hacker
14.99 €
In stock
The book deals with the security of computer networks. Practical recommendations for conducting a Cisco network pentest are given, useful information about the DTP protocol from Cisco Systems is provided, detailed guidance on network channel layer pentest, security testing and protection of MikroTik devices is provided.
The article describes the methods of pentests with minimal damage to the network infrastructure. Advice on the effective use of Kali Linux tools in the process of penetration testing, tells about the use of virtual machines for post-operation of systems. Recommendations for protecting network infrastructure from hacker attacks are described. Practical examples demonstrate pentest techniques for both the attacker and the defender.
For penetration testing specialists, network security experts and system administrators.
- Configure the Kali Linux distribution for pentest networks;
- Guide to the pentest of the channel level of the network;
- Cisco Network Pentest Guidelines;
- Guidance on pentest and protection of MikroTik devices;
- Recommendations for pentesting networks with the least damage to infrastructure;
Protection of network and network equipment from hacker attacks.
The article describes the methods of pentests with minimal damage to the network infrastructure. Advice on the effective use of Kali Linux tools in the process of penetration testing, tells about the use of virtual machines for post-operation of systems. Recommendations for protecting network infrastructure from hacker attacks are described. Practical examples demonstrate pentest techniques for both the attacker and the defender.
For penetration testing specialists, network security experts and system administrators.
- Configure the Kali Linux distribution for pentest networks;
- Guide to the pentest of the channel level of the network;
- Cisco Network Pentest Guidelines;
- Guidance on pentest and protection of MikroTik devices;
- Recommendations for pentesting networks with the least damage to infrastructure;
Protection of network and network equipment from hacker attacks.
See also:
- All books by the publisher
- All books by the author
- All books in the series In the eyes of a hacker
You might be interested:

Information technology
Moving to the Cloud: A Practical Guide to Cloud Computing for Scientists and IT Professionals
14.99 €