Hacking and Security

The Comprehensive Guide to Penetration Testing and Cybersecurity

Author: Michael Kofler

Michael Kofler (Author)
Visit Author Page
Books by him and info about author and more.

Are you a Author?
Learn more here

Write a review
Save 15%
Write a review
MRP: 5,13172
You Pay: 4,36196
You save: 769.76
Leadtime to ship in days (default): Usually ships in 25 days after release
Reward points: 44 points
Our advantages
  • — SMS notification
  • — Return and exchange
  • — Different payment methods
  • — Best price
  • — Personalised Service

This product will be shipped on 27-07-2023

To activate the key, please follow the steps listed below.

1. Go to http://www.sap-press.com and login to your account. 

2. Click on the “Library” icon located next to the shopping cart.

3. Copy and paste the license key number into the white box that says, “Enter license key”

4. Press the yellow button that says “Add Product”

5. Choose which option you would like for the book—Read Online, Download E-book, or Additional Data (not all books have this available).

Read Online allows you to read the book directly through our website.  If you choose to download, you will be given 3 options:

PDF – download and save this to your computer.  From there, you can add it to different electronic devices for your own use

EPUB – download to tablets and devices.

MOBI – download this format to transfer to your Kindle

AuthorMichael Kofler Leadtime to ship in days (default)Usually ships in 25 days after release

Uncover security vulnerabilities and harden your system against attacks! With this guide you’ll learn to set up a virtual learning environment where you can test out hacking tools, from Kali Linux to hydra and Wireshark. Then expand your understanding of offline hacking, external safety checks, penetration testing in networks, and other essential security techniques, with step-by-step instructions. With information on mobile, cloud, and IoT security you can fortify your system against any threat!

  • Understand IT system vulnerabilities and identify attack vectors
  • Learn to secure multiple infrastructures, including Linux, Microsoft Windows, cloud, and mobile
  • Master pen testing with tools like Metaspolit, Kali Linux, hydra, Open-VAS, Empire, Pwnagotchi, and more

In this book, you’ll learn about:

1.Key Concepts and Tools

Set up your environment with Metasploitable and Juice Shop and install Kali Linux. Then explore hacking tools like nmap, hydra, and Armitage that will assist you with the more complex practices covered in later chapters.

2. Penetration Testing and Security Practices

From thwarting man-in-the-middle attacks to finding vulnerabilities, walk step by step through client-side and network penetration testing. Master key security techniques like IT forensics and safety checks and see how to secure Windows servers, Linux, Samba file servers, and web applications.

3. Advanced Security Concepts

Get practical instruction on more advanced topics like cloud, mobile, and IoT security. Learn how to secure Office 365 through multi-level authentication and conditional access, explore protective measures for Android and iOS, and determine IoT protocols and services.

Highlights Include:

  • Penetration testing
  • Offline hacking
  • Active Directory
  • Linux
  • Cloud security
  • Mobile and IoT security
  • IT forensics
  • Windows security
  • USB attacks
  • Web application security
  • Software exploitation

Michael Kofler
Condition Type
Country Origin
Gift Wrap
Leadtime to ship in days (default)
Usually ships in 25 days after release
SAP Press
Find similar

No reviews found

Possibly you may be interested
  • Forthcoming/Pre-Order
  • Bestsellers
  • Recently Viewed
Fast and high quality delivery

Our company makes delivery all over the country

Quality assurance and service

We offer only those goods, in which quality we are sure

Returns within 30 days

You have 30 days to test your purchase