ODBIERZ TWÓJ BONUS :: »

Ethical Hacking with Parrot OS. Put your knowledge to work with offensive security techniques and try a Kali Linux alternative Tanisha L. Turner

Język publikacji: 1
Ethical Hacking with Parrot OS. Put your knowledge to work with offensive security techniques and try a Kali Linux alternative Tanisha L. Turner - okladka książki

Ethical Hacking with Parrot OS. Put your knowledge to work with offensive security techniques and try a Kali Linux alternative Tanisha L. Turner - okladka książki

Autor:
Tanisha L. Turner
Serie wydawnicze:
Hands-on
Ocena:
Parrot Security OS is a Linux distribution designed for cybersecurity, penetration testing, ethical hacking, and general IT security tasks. With plenty of cutting-edge features to suit beginners as well as advanced users, learn how Parrot OS is secure and versatile security testing environment.
This comprehensive guide will give you a full walkthrough of Parrot Security while offering a thorough overview of penetration testing methodology, along with some hints of modern technologies and attack scenarios like web, wireless, and cloud pentesting. Complete with laboratory setup and tutorials, code snippets, and real-world examples, this beginner-friendly book will take you through the foundations of ethical hacking using the Parrot OS. Meanwhile, experienced cybersecurity experts will be able to hands-on with ParrotSec’s powerful features quickly, and your existing knowledge of ethical hacking platforms like Kali Linux will help you master the advanced features and techniques in Parrot OS.
By the end of this book, you’ll have a solid grasp on Parrot Security and will be able to use its features to easily achieve your ethical hacking goals.

Wybrane bestsellery

O autorze książki

Tanisha L. Turner is an experienced cyber security professional in security operations, malware analysis & identification, and threat detections. She participates in non-profit organizations and has held executive leadership and advisory roles. Tanisha's contributions have been with RSAC (RSA Conference) in a podcast on Threat Modeling: Using the DIPP method. She has had speaking engagements with non-profit organizations such as ISSA (Information Systems Security Association) 360 Degree Cybersecurity Leadership and with Elastic Behavioral Analytics and Threat Detections. She has been recognized on lists that include Global Women in Cyber Project, and a 2022 recipient of a) Diverse Champion Award from Women Cybersecurity Society (WCS2).

Zobacz pozostałe książki z serii Hands-on

Packt Publishing - inne książki

Zamknij

Przenieś na półkę
Dodano produkt na półkę
Usunięto produkt z półki
Przeniesiono produkt do archiwum
Przeniesiono produkt do biblioteki

Zamknij

Wybierz metodę płatności

Sposób płatności
Zabrania się wykorzystania treści strony do celów eksploracji tekstu i danych (TDM), w tym eksploracji w celu szkolenia technologii AI i innych systemów uczenia maszynowego. It is forbidden to use the content of the site for text and data mining (TDM), including mining for training AI technologies and other machine learning systems.