Leading Christian Resource for Avid Readers, Support New Schools with Every Purchase.

Learn Kali Linux 2019: Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark

Paperback |English |1789611806 | 9781789611809

Learn Kali Linux 2019: Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark

Paperback |English |1789611806 | 9781789611809
Overview

Leverage Kali Linux to learn the latest ethical hacking tools and techniques

Key Features Learn to use Linux commands like ethical hackers to gain control of your environment. Get to grips with security concepts like social engineering, wireless network exploitation, web application attacks and more. A practical guide to getting you up and running with Kali Linux from scratch. Book Description

With the current buzz of hacking and security breaches displays how important it has become to pentest your environment, ensuring end point protection.

This book will take you through the most latest version of Kali Linux and will help you leverage various tools and techniques to efficiently deal with crucial security aspects.

With the help of real-world scenarios this practical guide will take you from setting up a lab to moving into core penetration testing concepts, covering various important security assessment tools bundled in Kali Linux. Through the course of this book you will learn from gathering sensitive information to vulnerability assessments tools and more. You will also get to grips with concepts such as social engineering, attacking wireless networks, exploitation of web applications and remote access connections. Later, you will focus on bypassing the controls, attacking the end user and maintaining persistence access through social media. Lastly, you will also learn some best practices of performing complex penetration testing techniques on highly secured environment.

By the end of this book. you will be well-versed with finding vulnerabilities and keeping your system intact leveraging simple to complex penetration testing techniques.

What you will learn Learn about Basics of Ethical Hacking Install-Kali Linux a Penetration Testing Operating System Perform Wireless Network Penetration Testing Understand Web Application Penetration Testing Determine Social Engineering Penetration Testing Crack WEP/WPA/WPA2 encryptions using various methods Who This Book Is For

If you are an IT security professional or a security consultant who wants to get started with penetration testing using Kali Linux 2018.2, or are just inquisitive about security breaches and ethical hacking then, this book is for you. No prior knowledge to Kali Linux is necessary. You can do wonders with some understanding of cybersecurity.

ISBN: 1789611806
ISBN13: 9781789611809
Author: Glen D. Singh
Publisher: Packt Publishing
Format: Paperback
PublicationDate: 2019-11-15
Language: English
PageCount: 550
Dimensions: 7.5 x 1.24 x 9.25 inches
Weight: 32.96 ounces

Leverage Kali Linux to learn the latest ethical hacking tools and techniques

Key Features Learn to use Linux commands like ethical hackers to gain control of your environment. Get to grips with security concepts like social engineering, wireless network exploitation, web application attacks and more. A practical guide to getting you up and running with Kali Linux from scratch. Book Description

With the current buzz of hacking and security breaches displays how important it has become to pentest your environment, ensuring end point protection.

This book will take you through the most latest version of Kali Linux and will help you leverage various tools and techniques to efficiently deal with crucial security aspects.

With the help of real-world scenarios this practical guide will take you from setting up a lab to moving into core penetration testing concepts, covering various important security assessment tools bundled in Kali Linux. Through the course of this book you will learn from gathering sensitive information to vulnerability assessments tools and more. You will also get to grips with concepts such as social engineering, attacking wireless networks, exploitation of web applications and remote access connections. Later, you will focus on bypassing the controls, attacking the end user and maintaining persistence access through social media. Lastly, you will also learn some best practices of performing complex penetration testing techniques on highly secured environment.

By the end of this book. you will be well-versed with finding vulnerabilities and keeping your system intact leveraging simple to complex penetration testing techniques.

What you will learn Learn about Basics of Ethical Hacking Install-Kali Linux a Penetration Testing Operating System Perform Wireless Network Penetration Testing Understand Web Application Penetration Testing Determine Social Engineering Penetration Testing Crack WEP/WPA/WPA2 encryptions using various methods Who This Book Is For

If you are an IT security professional or a security consultant who wants to get started with penetration testing using Kali Linux 2018.2, or are just inquisitive about security breaches and ethical hacking then, this book is for you. No prior knowledge to Kali Linux is necessary. You can do wonders with some understanding of cybersecurity.

Books - New and Used

The following guidelines apply to books:

  • New: A brand-new copy with cover and original protective wrapping intact. Books with markings of any kind on the cover or pages, books marked as "Bargain" or "Remainder," or with any other labels attached, may not be listed as New condition.
  • Used - Good: All pages and cover are intact (including the dust cover, if applicable). Spine may show signs of wear. Pages may include limited notes and highlighting. May include "From the library of" labels. Shrink wrap, dust covers, or boxed set case may be missing. Item may be missing bundled media.
  • Used - Acceptable: All pages and the cover are intact, but shrink wrap, dust covers, or boxed set case may be missing. Pages may include limited notes, highlighting, or minor water damage but the text is readable. Item may but the dust cover may be missing. Pages may include limited notes and highlighting, but the text cannot be obscured or unreadable.

Note: Some electronic material access codes are valid only for one user. For this reason, used books, including books listed in the Used – Like New condition, may not come with functional electronic material access codes.

Shipping Fees

  • Stevens Books offers FREE SHIPPING everywhere in the United States for ALL non-book orders, and $3.99 for each book.
  • Packages are shipped from Monday to Friday.
  • No additional fees and charges.

Delivery Times

The usual time for processing an order is 24 hours (1 business day), but may vary depending on the availability of products ordered. This period excludes delivery times, which depend on your geographic location.

Estimated delivery times:

  • Standard Shipping: 5-8 business days
  • Expedited Shipping: 3-5 business days

Shipping method varies depending on what is being shipped.  

Tracking
All orders are shipped with a tracking number. Once your order has left our warehouse, a confirmation e-mail with a tracking number will be sent to you. You will be able to track your package at all times. 

Damaged Parcel
If your package has been delivered in a PO Box, please note that we are not responsible for any damage that may result (consequences of extreme temperatures, theft, etc.). 

If you have any questions regarding shipping or want to know about the status of an order, please contact us or email to support@stevensbooks.com.

You may return most items within 30 days of delivery for a full refund.

To be eligible for a return, your item must be unused and in the same condition that you received it. It must also be in the original packaging.

Several types of goods are exempt from being returned. Perishable goods such as food, flowers, newspapers or magazines cannot be returned. We also do not accept products that are intimate or sanitary goods, hazardous materials, or flammable liquids or gases.

Additional non-returnable items:

  • Gift cards
  • Downloadable software products
  • Some health and personal care items

To complete your return, we require a tracking number, which shows the items which you already returned to us.
There are certain situations where only partial refunds are granted (if applicable)

  • Book with obvious signs of use
  • CD, DVD, VHS tape, software, video game, cassette tape, or vinyl record that has been opened
  • Any item not in its original condition, is damaged or missing parts for reasons not due to our error
  • Any item that is returned more than 30 days after delivery

Items returned to us as a result of our error will receive a full refund,some returns may be subject to a restocking fee of 7% of the total item price, please contact a customer care team member to see if your return is subject. Returns that arrived on time and were as described are subject to a restocking fee.

Items returned to us that were not the result of our error, including items returned to us due to an invalid or incomplete address, will be refunded the original item price less our standard restocking fees.

If the item is returned to us for any of the following reasons, a 15% restocking fee will be applied to your refund total and you will be asked to pay for return shipping:

  • Item(s) no longer needed or wanted.
  • Item(s) returned to us due to an invalid or incomplete address.
  • Item(s) returned to us that were not a result of our error.

You should expect to receive your refund within four weeks of giving your package to the return shipper, however, in many cases you will receive a refund more quickly. This time period includes the transit time for us to receive your return from the shipper (5 to 10 business days), the time it takes us to process your return once we receive it (3 to 5 business days), and the time it takes your bank to process our refund request (5 to 10 business days).

If you need to return an item, please Contact Us with your order number and details about the product you would like to return. We will respond quickly with instructions for how to return items from your order.


Shipping Cost


We'll pay the return shipping costs if the return is a result of our error (you received an incorrect or defective item, etc.). In other cases, you will be responsible for paying for your own shipping costs for returning your item. Shipping costs are non-refundable. If you receive a refund, the cost of return shipping will be deducted from your refund.

Depending on where you live, the time it may take for your exchanged product to reach you, may vary.

If you are shipping an item over $75, you should consider using a trackable shipping service or purchasing shipping insurance. We don’t guarantee that we will receive your returned item.

$43.79

    Condition

Arrives: -
In Stock

Overview

Leverage Kali Linux to learn the latest ethical hacking tools and techniques

Key Features Learn to use Linux commands like ethical hackers to gain control of your environment. Get to grips with security concepts like social engineering, wireless network exploitation, web application attacks and more. A practical guide to getting you up and running with Kali Linux from scratch. Book Description

With the current buzz of hacking and security breaches displays how important it has become to pentest your environment, ensuring end point protection.

This book will take you through the most latest version of Kali Linux and will help you leverage various tools and techniques to efficiently deal with crucial security aspects.

With the help of real-world scenarios this practical guide will take you from setting up a lab to moving into core penetration testing concepts, covering various important security assessment tools bundled in Kali Linux. Through the course of this book you will learn from gathering sensitive information to vulnerability assessments tools and more. You will also get to grips with concepts such as social engineering, attacking wireless networks, exploitation of web applications and remote access connections. Later, you will focus on bypassing the controls, attacking the end user and maintaining persistence access through social media. Lastly, you will also learn some best practices of performing complex penetration testing techniques on highly secured environment.

By the end of this book. you will be well-versed with finding vulnerabilities and keeping your system intact leveraging simple to complex penetration testing techniques.

What you will learn Learn about Basics of Ethical Hacking Install-Kali Linux a Penetration Testing Operating System Perform Wireless Network Penetration Testing Understand Web Application Penetration Testing Determine Social Engineering Penetration Testing Crack WEP/WPA/WPA2 encryptions using various methods Who This Book Is For

If you are an IT security professional or a security consultant who wants to get started with penetration testing using Kali Linux 2018.2, or are just inquisitive about security breaches and ethical hacking then, this book is for you. No prior knowledge to Kali Linux is necessary. You can do wonders with some understanding of cybersecurity.

ISBN: 1789611806
ISBN13: 9781789611809
Author: Glen D. Singh
Publisher: Packt Publishing
Format: Paperback
PublicationDate: 2019-11-15
Language: English
PageCount: 550
Dimensions: 7.5 x 1.24 x 9.25 inches
Weight: 32.96 ounces

Leverage Kali Linux to learn the latest ethical hacking tools and techniques

Key Features Learn to use Linux commands like ethical hackers to gain control of your environment. Get to grips with security concepts like social engineering, wireless network exploitation, web application attacks and more. A practical guide to getting you up and running with Kali Linux from scratch. Book Description

With the current buzz of hacking and security breaches displays how important it has become to pentest your environment, ensuring end point protection.

This book will take you through the most latest version of Kali Linux and will help you leverage various tools and techniques to efficiently deal with crucial security aspects.

With the help of real-world scenarios this practical guide will take you from setting up a lab to moving into core penetration testing concepts, covering various important security assessment tools bundled in Kali Linux. Through the course of this book you will learn from gathering sensitive information to vulnerability assessments tools and more. You will also get to grips with concepts such as social engineering, attacking wireless networks, exploitation of web applications and remote access connections. Later, you will focus on bypassing the controls, attacking the end user and maintaining persistence access through social media. Lastly, you will also learn some best practices of performing complex penetration testing techniques on highly secured environment.

By the end of this book. you will be well-versed with finding vulnerabilities and keeping your system intact leveraging simple to complex penetration testing techniques.

What you will learn Learn about Basics of Ethical Hacking Install-Kali Linux a Penetration Testing Operating System Perform Wireless Network Penetration Testing Understand Web Application Penetration Testing Determine Social Engineering Penetration Testing Crack WEP/WPA/WPA2 encryptions using various methods Who This Book Is For

If you are an IT security professional or a security consultant who wants to get started with penetration testing using Kali Linux 2018.2, or are just inquisitive about security breaches and ethical hacking then, this book is for you. No prior knowledge to Kali Linux is necessary. You can do wonders with some understanding of cybersecurity.

Books - New and Used

The following guidelines apply to books:

  • New: A brand-new copy with cover and original protective wrapping intact. Books with markings of any kind on the cover or pages, books marked as "Bargain" or "Remainder," or with any other labels attached, may not be listed as New condition.
  • Used - Good: All pages and cover are intact (including the dust cover, if applicable). Spine may show signs of wear. Pages may include limited notes and highlighting. May include "From the library of" labels. Shrink wrap, dust covers, or boxed set case may be missing. Item may be missing bundled media.
  • Used - Acceptable: All pages and the cover are intact, but shrink wrap, dust covers, or boxed set case may be missing. Pages may include limited notes, highlighting, or minor water damage but the text is readable. Item may but the dust cover may be missing. Pages may include limited notes and highlighting, but the text cannot be obscured or unreadable.

Note: Some electronic material access codes are valid only for one user. For this reason, used books, including books listed in the Used – Like New condition, may not come with functional electronic material access codes.

Shipping Fees

  • Stevens Books offers FREE SHIPPING everywhere in the United States for ALL non-book orders, and $3.99 for each book.
  • Packages are shipped from Monday to Friday.
  • No additional fees and charges.

Delivery Times

The usual time for processing an order is 24 hours (1 business day), but may vary depending on the availability of products ordered. This period excludes delivery times, which depend on your geographic location.

Estimated delivery times:

  • Standard Shipping: 5-8 business days
  • Expedited Shipping: 3-5 business days

Shipping method varies depending on what is being shipped.  

Tracking
All orders are shipped with a tracking number. Once your order has left our warehouse, a confirmation e-mail with a tracking number will be sent to you. You will be able to track your package at all times. 

Damaged Parcel
If your package has been delivered in a PO Box, please note that we are not responsible for any damage that may result (consequences of extreme temperatures, theft, etc.). 

If you have any questions regarding shipping or want to know about the status of an order, please contact us or email to support@stevensbooks.com.

You may return most items within 30 days of delivery for a full refund.

To be eligible for a return, your item must be unused and in the same condition that you received it. It must also be in the original packaging.

Several types of goods are exempt from being returned. Perishable goods such as food, flowers, newspapers or magazines cannot be returned. We also do not accept products that are intimate or sanitary goods, hazardous materials, or flammable liquids or gases.

Additional non-returnable items:

  • Gift cards
  • Downloadable software products
  • Some health and personal care items

To complete your return, we require a tracking number, which shows the items which you already returned to us.
There are certain situations where only partial refunds are granted (if applicable)

  • Book with obvious signs of use
  • CD, DVD, VHS tape, software, video game, cassette tape, or vinyl record that has been opened
  • Any item not in its original condition, is damaged or missing parts for reasons not due to our error
  • Any item that is returned more than 30 days after delivery

Items returned to us as a result of our error will receive a full refund,some returns may be subject to a restocking fee of 7% of the total item price, please contact a customer care team member to see if your return is subject. Returns that arrived on time and were as described are subject to a restocking fee.

Items returned to us that were not the result of our error, including items returned to us due to an invalid or incomplete address, will be refunded the original item price less our standard restocking fees.

If the item is returned to us for any of the following reasons, a 15% restocking fee will be applied to your refund total and you will be asked to pay for return shipping:

  • Item(s) no longer needed or wanted.
  • Item(s) returned to us due to an invalid or incomplete address.
  • Item(s) returned to us that were not a result of our error.

You should expect to receive your refund within four weeks of giving your package to the return shipper, however, in many cases you will receive a refund more quickly. This time period includes the transit time for us to receive your return from the shipper (5 to 10 business days), the time it takes us to process your return once we receive it (3 to 5 business days), and the time it takes your bank to process our refund request (5 to 10 business days).

If you need to return an item, please Contact Us with your order number and details about the product you would like to return. We will respond quickly with instructions for how to return items from your order.


Shipping Cost


We'll pay the return shipping costs if the return is a result of our error (you received an incorrect or defective item, etc.). In other cases, you will be responsible for paying for your own shipping costs for returning your item. Shipping costs are non-refundable. If you receive a refund, the cost of return shipping will be deducted from your refund.

Depending on where you live, the time it may take for your exchanged product to reach you, may vary.

If you are shipping an item over $75, you should consider using a trackable shipping service or purchasing shipping insurance. We don’t guarantee that we will receive your returned item.

Categories
X

Oops!

Sorry, it looks like some products are not available in selected quantity.

OK

Sign up to the Stevens Books Newsletter

For the latest books, recommendations, author interviews and more

By signing up, I confirm that I'm over 16. To find out what personal data we collect and how we use it, please visit. our Privacy Policy.