|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Sairam Jetty , Sagar RahalkarPublisher: Packt Publishing Limited Imprint: Packt Publishing Limited ISBN: 9781838642303ISBN 10: 1838642307 Pages: 538 Publication Date: 26 March 2019 Audience: General/trade , General Format: Paperback Publisher's Status: Active Availability: Available To Order ![]() We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsTable of Contents Introduction to Network Vulnerability Scanning Understanding Network Scanning Tools Port Scanning Vulnerability Scanning Configuration Audits Report Analysis and Confirmation Understanding the Customization and Optimization of Nessus and Nmap Network Scanning for IoT, SCADA/ICS Vulnerability Management Governance Setting Up the Assessment Environment Security Assessment Prerequisites Information Gathering Enumeration and Vulnerability Assessment Gaining Network Access Assessing Web Application Security Privilege Escalation Maintaining Access and Clearing Tracks Vulnerability Scoring Threat Modeling Patching and Security Hardening Vulnerability Reporting and MetricsReviewsAuthor InformationSairam Jetty has more than 5 years of hands-on experience in many verticals of penetration testing, compliance, digital forensics, and malware research. He is currently working with Paladion Networks, Abu Dhabi, as a senior analyst and team lead. He has assisted and associated with various financial, telecom, and industrial institutions for testing and securing their applications and environments. Sairam has industry-standard certifications, such as OSCP, Digital Forensic Analyst, Digital Forensic Investigator, and Mobile Security Expert. He also specializes in source code review and mobile application security. He has acquired a great knowledge of SCADA/ICS and nuclear security from his corporate experience and self-learning. Sagar Rahalkar is a seasoned information security professional with an experience of 12 years in various verticals of IS. His domain expertise is in Cybercrime investigations, Forensics, AppSec, VA/PT, Compliance, IT GRC and so on. He has a master's degree in computer science and several certifications, including Cyber Crime Investigator, CEH, ECSA, ISO 27001 LA, IBM AppScan Certified, CISM, and PRINCE2. He has been associated with Indian law enforcement agencies for around 4 years for dealing with cybercrime investigations and related training. He has received several awards and appreciations from senior officials of the police and defense organizations in India. He has also been a reviewer and author for various books and online publications. Tab Content 6Author Website:Countries AvailableAll regions |