- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Mastering Cybersecurity - A Practical Guide to Cyber Tools & Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills. This volume builds on foundational concepts to provide readers with practical techniques and toolsets that are essential in today's evolving threat landscape.
Andere Kunden interessierten sich auch für
- Sarah Armstrong-SmithUnderstand the Cyber Attacker Mindset109,99 €
- Cybercrime Through an Interdisciplinary Lens192,99 €
- Alan GridCYBERSECURITY18,99 €
- Alan GridCybersecurity26,99 €
- BeersPractical Methods for Legal Investigations173,99 €
- David H McElreathIntroduction to Corrections135,99 €
- Rural Victims of Crime164,99 €
-
-
-
Mastering Cybersecurity - A Practical Guide to Cyber Tools & Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills. This volume builds on foundational concepts to provide readers with practical techniques and toolsets that are essential in today's evolving threat landscape.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 336
- Erscheinungstermin: 21. Oktober 2025
- Englisch
- Abmessung: 234mm x 156mm
- ISBN-13: 9781032887432
- ISBN-10: 1032887435
- Artikelnr.: 74172334
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 336
- Erscheinungstermin: 21. Oktober 2025
- Englisch
- Abmessung: 234mm x 156mm
- ISBN-13: 9781032887432
- ISBN-10: 1032887435
- Artikelnr.: 74172334
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Dr. Akashdeep Bhardwaj is working as Professor and Head of Cybersecurity (Center of Excellence) at University of Petroleum & Energy Studies (UPES), Dehradun, India. An eminent IT Industry expert with over 28 years of experience in areas such as Cybersecurity, Digital Forensics and IT Operations, Dr. Akashdeep mentors' Cyber graduates, masters and doctoral students and leads industry projects and research in his university. Dr. Akashdeep is a Post-Doctoral from Majmaah University, Saudi Arabia, and a Ph.D. in Computer Science. Dr. Akashdeep has published over 135 research works (including copyrights, patents, research papers, authored & edited books) in highly referred international journals. Dr. Akashdeep has worked as Technology Leader for several multinational organizations during his time in the IT industry. Dr. Akashdeep is certified in IT, Cybersecurity and Digital Forensics technologies including Compliance Audits, Networking Cybersecurity, Digital Forensics and holds multiple industry certifications.
11. Chapter 1: Networking for Cyber Professionals
Learn about the basics of networking, protocols, ports from Cybersecurity
perspectives.
12. Chapter 2: Deciphering Data Streams: Network Traffic Analysis
Master the art of network traffic analysis using industry-standard tools to
identify suspicious network activity and potential data breaches.
13. Chapter 3: Open-Source Intelligence: Harnessing Intelligence from
Digital space
Discover the power of OSINT and learn to unveil digital footprints.
14. Chapter 4: Hands-on OSINT Investigations
Conduct real-world OSINT investigations, harnessing social media, web, and
publicly available sources for gathering valuable intelligence.
15. Chapter 5: Securing of Smart Interconnected Devices
Explore the unique challenges of securing smart devices and
internet-connected devices (IoT).
16. Chapter 6: Ethical Hacking of Smart IoT Devices
Perform penetration testing of Smart interconnected ecosystems to expose
and exploit vulnerabilities.
17. Chapter 7: Into the Shadows: Theory of Dark Web Investigations
Go beyond the surface web and delve into the hidden online world of the
dark web.
18. Chapter 8: Hands-on Dark Web Investigations
Learn safe exploration techniques to gather intelligence from hidden forums
and marketplaces to stay ahead of potential threats.
19. Chapter 9: Exploit the Gaps: Theory of Ethical Exploitation and
Reporting
Master the art of Ethical Hacking during penetration testing. Learn to
document your findings.
20. Chapter 10: Hands-on Exploitation of OS & Apps
Master the art of exploiting vulnerabilities ethically during pen testing.
Write compelling penetration testing reports that provide actionable
insights for remediation.
Learn about the basics of networking, protocols, ports from Cybersecurity
perspectives.
12. Chapter 2: Deciphering Data Streams: Network Traffic Analysis
Master the art of network traffic analysis using industry-standard tools to
identify suspicious network activity and potential data breaches.
13. Chapter 3: Open-Source Intelligence: Harnessing Intelligence from
Digital space
Discover the power of OSINT and learn to unveil digital footprints.
14. Chapter 4: Hands-on OSINT Investigations
Conduct real-world OSINT investigations, harnessing social media, web, and
publicly available sources for gathering valuable intelligence.
15. Chapter 5: Securing of Smart Interconnected Devices
Explore the unique challenges of securing smart devices and
internet-connected devices (IoT).
16. Chapter 6: Ethical Hacking of Smart IoT Devices
Perform penetration testing of Smart interconnected ecosystems to expose
and exploit vulnerabilities.
17. Chapter 7: Into the Shadows: Theory of Dark Web Investigations
Go beyond the surface web and delve into the hidden online world of the
dark web.
18. Chapter 8: Hands-on Dark Web Investigations
Learn safe exploration techniques to gather intelligence from hidden forums
and marketplaces to stay ahead of potential threats.
19. Chapter 9: Exploit the Gaps: Theory of Ethical Exploitation and
Reporting
Master the art of Ethical Hacking during penetration testing. Learn to
document your findings.
20. Chapter 10: Hands-on Exploitation of OS & Apps
Master the art of exploiting vulnerabilities ethically during pen testing.
Write compelling penetration testing reports that provide actionable
insights for remediation.
11. Chapter 1: Networking for Cyber Professionals
Learn about the basics of networking, protocols, ports from Cybersecurity
perspectives.
12. Chapter 2: Deciphering Data Streams: Network Traffic Analysis
Master the art of network traffic analysis using industry-standard tools to
identify suspicious network activity and potential data breaches.
13. Chapter 3: Open-Source Intelligence: Harnessing Intelligence from
Digital space
Discover the power of OSINT and learn to unveil digital footprints.
14. Chapter 4: Hands-on OSINT Investigations
Conduct real-world OSINT investigations, harnessing social media, web, and
publicly available sources for gathering valuable intelligence.
15. Chapter 5: Securing of Smart Interconnected Devices
Explore the unique challenges of securing smart devices and
internet-connected devices (IoT).
16. Chapter 6: Ethical Hacking of Smart IoT Devices
Perform penetration testing of Smart interconnected ecosystems to expose
and exploit vulnerabilities.
17. Chapter 7: Into the Shadows: Theory of Dark Web Investigations
Go beyond the surface web and delve into the hidden online world of the
dark web.
18. Chapter 8: Hands-on Dark Web Investigations
Learn safe exploration techniques to gather intelligence from hidden forums
and marketplaces to stay ahead of potential threats.
19. Chapter 9: Exploit the Gaps: Theory of Ethical Exploitation and
Reporting
Master the art of Ethical Hacking during penetration testing. Learn to
document your findings.
20. Chapter 10: Hands-on Exploitation of OS & Apps
Master the art of exploiting vulnerabilities ethically during pen testing.
Write compelling penetration testing reports that provide actionable
insights for remediation.
Learn about the basics of networking, protocols, ports from Cybersecurity
perspectives.
12. Chapter 2: Deciphering Data Streams: Network Traffic Analysis
Master the art of network traffic analysis using industry-standard tools to
identify suspicious network activity and potential data breaches.
13. Chapter 3: Open-Source Intelligence: Harnessing Intelligence from
Digital space
Discover the power of OSINT and learn to unveil digital footprints.
14. Chapter 4: Hands-on OSINT Investigations
Conduct real-world OSINT investigations, harnessing social media, web, and
publicly available sources for gathering valuable intelligence.
15. Chapter 5: Securing of Smart Interconnected Devices
Explore the unique challenges of securing smart devices and
internet-connected devices (IoT).
16. Chapter 6: Ethical Hacking of Smart IoT Devices
Perform penetration testing of Smart interconnected ecosystems to expose
and exploit vulnerabilities.
17. Chapter 7: Into the Shadows: Theory of Dark Web Investigations
Go beyond the surface web and delve into the hidden online world of the
dark web.
18. Chapter 8: Hands-on Dark Web Investigations
Learn safe exploration techniques to gather intelligence from hidden forums
and marketplaces to stay ahead of potential threats.
19. Chapter 9: Exploit the Gaps: Theory of Ethical Exploitation and
Reporting
Master the art of Ethical Hacking during penetration testing. Learn to
document your findings.
20. Chapter 10: Hands-on Exploitation of OS & Apps
Master the art of exploiting vulnerabilities ethically during pen testing.
Write compelling penetration testing reports that provide actionable
insights for remediation.