This Book Includes: Hacking with Kali Linux, Ethical Hacking. Learn How to Manage Cyber Risks Using Defense Strategies and Penetration Testing for Information Systems Security.
Slutsåld
ZACH CODINGS was born in Seattle in 1975. He is one of the world's leading experts in computer science and cybersecurity.
Since childhood, Zach has always loved computers, which were much less evolved than today's machines. He was self-taught and wrote his first program when he was only 14 years old. It was a simple game but making it at that time was not easy!
Thanks to his resourcefulness, he was noticed by the high school's computer science professor, who immediately recognized his talent. Through his teachings, he quickly learned the basics of computer science. He became increasingly passionate about the world of computers.
During his college he began to take an interest in cybersecurity.
After graduating with top grades, he worked hard to create an innovative security system, which he still distributes today through his computer company.
Zach runs his cybersecurity company and contributes to the digital security of hundreds of his customers.
The author's mission is to help beginners worldwide master the art of programming and fascinate even the youngest to the beautiful computer science world.
Zach sees programming languages as an accurate means of creative expression that can provide excellent personal and professional satisfaction if well mastered.
introduction
chapter 1: what is hacking
chapter 2: pick your hat
chapter 3: how it works & how to get away with it
chapter 4: cybersecurity
chapter 5: getting to grips with kali linux
chapter 6: penetration tests
chapter 7: how malware & cyber attacks operate
chapter 8: how to scan networks
chapter 9: vpns & firewalls
chapter 10: an introduction to cryptography & digital signature
conclusion
introduction
chapter 1: what is ethical hacking?
chapter 2: hacking as a career
chapter 3: making money freelance
chapter 4: the three hats
chapter 5: ethical hacking explained
chapter 6: how to scan your system
chapter 7: penetration testing
chapter 8: most common security tools
chapter 9: what do i need to know
conclusion