Saved in:
Main Author: | |
---|---|
Corporate Author: | |
Format: | Electronic Video |
Language: | English |
Published: |
[Erscheinungsort nicht ermittelbar]
EC-Council
2020
|
Edition: | 1st edition. |
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/430920ICRV/?ar |
Summary: | Do you want to become a pro with the tools that Kali Linux offers? Perform advanced penetration testing? Learn and practice ways to exploit the vulnerable systems and patch them! Get ready to make the best use of one of the most popular pen testing tools fancied by hackers around the globe. This course will start from scratch and will provide you with essential knowledge of the most happening and widely used tools available in Kali Linux by performing real-world practicals. You will learn sniffing and spoofing attacks. You will also learn wireless hacking along with exploitation and post-exploitation techniques. This will train you to exploit various systems to carry out several powerful attacks and enable you to write reports post penetration testing. After completion of this course, you will be a pro in using major tools in Kali Linux and perform penetration testing. |
Item Description: | Online resource; Title from title screen (viewed August 31, 2020) |
Physical Description: | 1 Online-Ressource (1 video file, circa 4 hr., 39 min.) |
Staff View
MARC
LEADER | 00000cgm a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-068276699 | ||
003 | DE-627-1 | ||
005 | 20240228121432.0 | ||
006 | m o | | | ||
007 | cr uuu---uuuuu | ||
008 | 210914s2020 xx ||| |o o ||eng c | ||
035 | |a (DE-627-1)068276699 | ||
035 | |a (DE-599)KEP068276699 | ||
035 | |a (ORHE)430920ICRV | ||
035 | |a (DE-627-1)068276699 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
100 | 1 | |a Gupta, Sunil |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Mastering Pentesting Using Kali Linux |c Gupta, Sunil |
250 | |a 1st edition. | ||
264 | 1 | |a [Erscheinungsort nicht ermittelbar] |b EC-Council |c 2020 | |
300 | |a 1 Online-Ressource (1 video file, circa 4 hr., 39 min.) | ||
336 | |a zweidimensionales bewegtes Bild |b tdi |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; Title from title screen (viewed August 31, 2020) | ||
520 | |a Do you want to become a pro with the tools that Kali Linux offers? Perform advanced penetration testing? Learn and practice ways to exploit the vulnerable systems and patch them! Get ready to make the best use of one of the most popular pen testing tools fancied by hackers around the globe. This course will start from scratch and will provide you with essential knowledge of the most happening and widely used tools available in Kali Linux by performing real-world practicals. You will learn sniffing and spoofing attacks. You will also learn wireless hacking along with exploitation and post-exploitation techniques. This will train you to exploit various systems to carry out several powerful attacks and enable you to write reports post penetration testing. After completion of this course, you will be a pro in using major tools in Kali Linux and perform penetration testing. | ||
650 | 4 | |a Electronic videos ; local | |
710 | 2 | |a Safari, an O'Reilly Media Company., |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/430920ICRV/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
935 | |c vide | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-068276699 |
---|---|
_version_ | 1835903261790437376 |
adam_text | |
any_adam_object | |
author | Gupta, Sunil |
author_corporate | Safari, an O'Reilly Media Company |
author_corporate_role | ctb |
author_facet | Gupta, Sunil Safari, an O'Reilly Media Company |
author_role | aut |
author_sort | Gupta, Sunil |
author_variant | s g sg |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)068276699 (DE-599)KEP068276699 (ORHE)430920ICRV |
edition | 1st edition. |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02128cgm a22003612c 4500</leader><controlfield tag="001">ZDB-30-ORH-068276699</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121432.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">210914s2020 xx ||| |o o ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)068276699</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP068276699</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)430920ICRV</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)068276699</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gupta, Sunil</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mastering Pentesting Using Kali Linux</subfield><subfield code="c">Gupta, Sunil</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Erscheinungsort nicht ermittelbar]</subfield><subfield code="b">EC-Council</subfield><subfield code="c">2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 video file, circa 4 hr., 39 min.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; Title from title screen (viewed August 31, 2020)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Do you want to become a pro with the tools that Kali Linux offers? Perform advanced penetration testing? Learn and practice ways to exploit the vulnerable systems and patch them! Get ready to make the best use of one of the most popular pen testing tools fancied by hackers around the globe. This course will start from scratch and will provide you with essential knowledge of the most happening and widely used tools available in Kali Linux by performing real-world practicals. You will learn sniffing and spoofing attacks. You will also learn wireless hacking along with exploitation and post-exploitation techniques. This will train you to exploit various systems to carry out several powerful attacks and enable you to write reports post penetration testing. After completion of this course, you will be a pro in using major tools in Kali Linux and perform penetration testing.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic videos ; local</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Safari, an O'Reilly Media Company.,</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/430920ICRV/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-068276699 |
illustrated | Not Illustrated |
indexdate | 2025-06-25T12:16:28Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 video file, circa 4 hr., 39 min.) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | EC-Council |
record_format | marc |
spelling | Gupta, Sunil VerfasserIn aut Mastering Pentesting Using Kali Linux Gupta, Sunil 1st edition. [Erscheinungsort nicht ermittelbar] EC-Council 2020 1 Online-Ressource (1 video file, circa 4 hr., 39 min.) zweidimensionales bewegtes Bild tdi rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; Title from title screen (viewed August 31, 2020) Do you want to become a pro with the tools that Kali Linux offers? Perform advanced penetration testing? Learn and practice ways to exploit the vulnerable systems and patch them! Get ready to make the best use of one of the most popular pen testing tools fancied by hackers around the globe. This course will start from scratch and will provide you with essential knowledge of the most happening and widely used tools available in Kali Linux by performing real-world practicals. You will learn sniffing and spoofing attacks. You will also learn wireless hacking along with exploitation and post-exploitation techniques. This will train you to exploit various systems to carry out several powerful attacks and enable you to write reports post penetration testing. After completion of this course, you will be a pro in using major tools in Kali Linux and perform penetration testing. Electronic videos ; local Safari, an O'Reilly Media Company., MitwirkendeR ctb |
spellingShingle | Gupta, Sunil Mastering Pentesting Using Kali Linux Electronic videos ; local |
title | Mastering Pentesting Using Kali Linux |
title_auth | Mastering Pentesting Using Kali Linux |
title_exact_search | Mastering Pentesting Using Kali Linux |
title_full | Mastering Pentesting Using Kali Linux Gupta, Sunil |
title_fullStr | Mastering Pentesting Using Kali Linux Gupta, Sunil |
title_full_unstemmed | Mastering Pentesting Using Kali Linux Gupta, Sunil |
title_short | Mastering Pentesting Using Kali Linux |
title_sort | mastering pentesting using kali linux |
topic | Electronic videos ; local |
topic_facet | Electronic videos ; local |
work_keys_str_mv | AT guptasunil masteringpentestingusingkalilinux AT safarianoreillymediacompany masteringpentestingusingkalilinux |