책 이미지
책 정보
· 분류 : 외국도서 > 컴퓨터 > 보안 > 암호
· ISBN : 9781032887432
· 쪽수 : 236쪽
· 출판일 : 2025-11-27
목차
11. Chapter 1: Networking for Cyber Professionals Learn about the basics of networking, protocols, ports from Cybersecurity perspectives. 12. Chapter 2: Deciphering Data Streams: Network Traffic Analysis Master the art of network traffic analysis using industry-standard tools to identify suspicious network activity and potential data breaches. 13. Chapter 3: Open-Source Intelligence: Harnessing Intelligence from Digital space Discover the power of OSINT and learn to unveil digital footprints. 14. Chapter 4: Hands-on OSINT Investigations Conduct real-world OSINT investigations, harnessing social media, web, and publicly available sources for gathering valuable intelligence. 15. Chapter 5: Securing of Smart Interconnected Devices Explore the unique challenges of securing smart devices and internet-connected devices (IoT). 16. Chapter 6: Ethical Hacking of Smart IoT Devices Perform penetration testing of Smart interconnected ecosystems to expose and exploit vulnerabilities. 17. Chapter 7: Into the Shadows: Theory of Dark Web Investigations Go beyond the surface web and delve into the hidden online world of the dark web. 18. Chapter 8: Hands-on Dark Web Investigations Learn safe exploration techniques to gather intelligence from hidden forums and marketplaces to stay ahead of potential threats. 19. Chapter 9: Exploit the Gaps: Theory of Ethical Exploitation and Reporting Master the art of Ethical Hacking during penetration testing. Learn to document your findings. 20. Chapter 10: Hands-on Exploitation of OS & Apps Master the art of exploiting vulnerabilities ethically during pen testing. Write compelling penetration testing reports that provide actionable insights for remediation.














