CyberSec first responder (CFR-310):
The course begins by introducing you to the fundamentals of cybersecurity, setting the stage for a deep dive into the world of threat actors and their motives. As the curriculum unfolds, you'll explore the intricacies of attack vectors, network scanning, and vulnerability assessments, understan...
Saved in:
Corporate Authors: | , |
---|---|
Other Authors: | , |
Format: | Electronic Video |
Language: | English |
Published: |
[Place of publication not identified]
Packt Publishing
2024
|
Edition: | [First edition]. |
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781835887882/?ar |
Summary: | The course begins by introducing you to the fundamentals of cybersecurity, setting the stage for a deep dive into the world of threat actors and their motives. As the curriculum unfolds, you'll explore the intricacies of attack vectors, network scanning, and vulnerability assessments, understanding their critical role in cybersecurity defense. The course focuses on equipping you with the tools for penetration testing, web application security, and the latest in exploitation frameworks. Practical knowledge is extended to mobile and wireless security challenges, ensuring a holistic skill set. The course wraps up with advanced techniques in incident response, anomaly detection, and the application of forensic concepts, preparing you for real-world cybersecurity challenges. What you will learn Conduct thorough vulnerability scans Execute advanced penetration tests Secure web and mobile applications Counteract wireless and network attacks Implement strategic incident response Apply forensic analysis techniques Audience The course is ideal for IT professionals aspiring to become cybersecurity experts. Familiarity with basic IT concepts and a passion for security are prerequisites. This course is an excellent match for those looking to specialize in incident response and threat management. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts. |
Item Description: | Online resource; title from title details screen (O'Reilly, viewed January 23, 2024) |
Physical Description: | 1 Online-Ressource (1 video file (13 hr., 18 min.)) sound, color. |
ISBN: | 9781835887882 1835887880 |
Staff View
MARC
LEADER | 00000cgm a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-100397611 | ||
003 | DE-627-1 | ||
005 | 20240228122132.0 | ||
006 | m o | | | ||
007 | cr uuu---uuuuu | ||
008 | 240129s2024 xx ||| |o o ||eng c | ||
020 | |a 9781835887882 |c electronic video |9 978-1-83588-788-2 | ||
020 | |a 1835887880 |c electronic video |9 1-83588-788-0 | ||
035 | |a (DE-627-1)100397611 | ||
035 | |a (DE-599)KEP100397611 | ||
035 | |a (ORHE)9781835887882 | ||
035 | |a (DE-627-1)100397611 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8076 |2 23/eng/20240123 | |
245 | 0 | 0 | |a CyberSec first responder (CFR-310) |
250 | |a [First edition]. | ||
264 | 1 | |a [Place of publication not identified] |b Packt Publishing |c 2024 | |
300 | |a 1 Online-Ressource (1 video file (13 hr., 18 min.)) |b sound, color. | ||
336 | |a zweidimensionales bewegtes Bild |b tdi |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from title details screen (O'Reilly, viewed January 23, 2024) | ||
520 | |a The course begins by introducing you to the fundamentals of cybersecurity, setting the stage for a deep dive into the world of threat actors and their motives. As the curriculum unfolds, you'll explore the intricacies of attack vectors, network scanning, and vulnerability assessments, understanding their critical role in cybersecurity defense. The course focuses on equipping you with the tools for penetration testing, web application security, and the latest in exploitation frameworks. Practical knowledge is extended to mobile and wireless security challenges, ensuring a holistic skill set. The course wraps up with advanced techniques in incident response, anomaly detection, and the application of forensic concepts, preparing you for real-world cybersecurity challenges. What you will learn Conduct thorough vulnerability scans Execute advanced penetration tests Secure web and mobile applications Counteract wireless and network attacks Implement strategic incident response Apply forensic analysis techniques Audience The course is ideal for IT professionals aspiring to become cybersecurity experts. Familiarity with basic IT concepts and a passion for security are prerequisites. This course is an excellent match for those looking to specialize in incident response and threat management. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts. | ||
650 | 0 | |a Computer security |v Study guides |x Examinations | |
650 | 0 | |a Computer networks |v Study guides |x Examinations |x Security measures | |
650 | 4 | |a Sécurité informatique ; Examens ; Guides de l'étudiant | |
650 | 4 | |a Réseaux d'ordinateurs ; Examens ; Sécurité ; Mesures ; Guides de l'étudiant | |
650 | 4 | |a Instructional films | |
650 | 4 | |a Nonfiction films | |
650 | 4 | |a Internet videos | |
650 | 4 | |a Films de formation | |
650 | 4 | |a Films autres que de fiction | |
650 | 4 | |a Vidéos sur Internet | |
700 | 1 | |a Lowrie, Daniel |e MitwirkendeR |4 ctb | |
700 | 1 | |a Memos, Zachary |e MitwirkendeR |4 ctb | |
710 | 2 | |a ACI Learning, |e MitwirkendeR |4 ctb | |
710 | 2 | |a Packt Publishing, |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781835887882/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
935 | |c vide | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-100397611 |
---|---|
_version_ | 1831287149096337408 |
adam_text | |
any_adam_object | |
author2 | Lowrie, Daniel Memos, Zachary |
author2_role | ctb ctb |
author2_variant | d l dl z m zm |
author_corporate | ACI Learning Packt Publishing |
author_corporate_role | ctb ctb |
author_facet | Lowrie, Daniel Memos, Zachary ACI Learning Packt Publishing |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)100397611 (DE-599)KEP100397611 (ORHE)9781835887882 |
dewey-full | 005.8076 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8076 |
dewey-search | 005.8076 |
dewey-sort | 15.8076 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04000cgm a22005292c 4500</leader><controlfield tag="001">ZDB-30-ORH-100397611</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228122132.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240129s2024 xx ||| |o o ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781835887882</subfield><subfield code="c">electronic video</subfield><subfield code="9">978-1-83588-788-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1835887880</subfield><subfield code="c">electronic video</subfield><subfield code="9">1-83588-788-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)100397611</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP100397611</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781835887882</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)100397611</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8076</subfield><subfield code="2">23/eng/20240123</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">CyberSec first responder (CFR-310)</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 video file (13 hr., 18 min.))</subfield><subfield code="b">sound, color.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The course begins by introducing you to the fundamentals of cybersecurity, setting the stage for a deep dive into the world of threat actors and their motives. As the curriculum unfolds, you'll explore the intricacies of attack vectors, network scanning, and vulnerability assessments, understanding their critical role in cybersecurity defense. The course focuses on equipping you with the tools for penetration testing, web application security, and the latest in exploitation frameworks. Practical knowledge is extended to mobile and wireless security challenges, ensuring a holistic skill set. The course wraps up with advanced techniques in incident response, anomaly detection, and the application of forensic concepts, preparing you for real-world cybersecurity challenges. What you will learn Conduct thorough vulnerability scans Execute advanced penetration tests Secure web and mobile applications Counteract wireless and network attacks Implement strategic incident response Apply forensic analysis techniques Audience The course is ideal for IT professionals aspiring to become cybersecurity experts. Familiarity with basic IT concepts and a passion for security are prerequisites. This course is an excellent match for those looking to specialize in incident response and threat management. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="v">Study guides</subfield><subfield code="x">Examinations</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="v">Study guides</subfield><subfield code="x">Examinations</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Examens ; Guides de l'étudiant</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Examens ; Sécurité ; Mesures ; Guides de l'étudiant</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Instructional films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Nonfiction films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet videos</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films de formation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films autres que de fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Vidéos sur Internet</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lowrie, Daniel</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Memos, Zachary</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ACI Learning,</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Packt Publishing,</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781835887882/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-100397611 |
illustrated | Not Illustrated |
indexdate | 2025-05-05T13:25:20Z |
institution | BVB |
isbn | 9781835887882 1835887880 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 video file (13 hr., 18 min.)) sound, color. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Packt Publishing |
record_format | marc |
spelling | CyberSec first responder (CFR-310) [First edition]. [Place of publication not identified] Packt Publishing 2024 1 Online-Ressource (1 video file (13 hr., 18 min.)) sound, color. zweidimensionales bewegtes Bild tdi rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from title details screen (O'Reilly, viewed January 23, 2024) The course begins by introducing you to the fundamentals of cybersecurity, setting the stage for a deep dive into the world of threat actors and their motives. As the curriculum unfolds, you'll explore the intricacies of attack vectors, network scanning, and vulnerability assessments, understanding their critical role in cybersecurity defense. The course focuses on equipping you with the tools for penetration testing, web application security, and the latest in exploitation frameworks. Practical knowledge is extended to mobile and wireless security challenges, ensuring a holistic skill set. The course wraps up with advanced techniques in incident response, anomaly detection, and the application of forensic concepts, preparing you for real-world cybersecurity challenges. What you will learn Conduct thorough vulnerability scans Execute advanced penetration tests Secure web and mobile applications Counteract wireless and network attacks Implement strategic incident response Apply forensic analysis techniques Audience The course is ideal for IT professionals aspiring to become cybersecurity experts. Familiarity with basic IT concepts and a passion for security are prerequisites. This course is an excellent match for those looking to specialize in incident response and threat management. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts. Computer security Study guides Examinations Computer networks Study guides Examinations Security measures Sécurité informatique ; Examens ; Guides de l'étudiant Réseaux d'ordinateurs ; Examens ; Sécurité ; Mesures ; Guides de l'étudiant Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet Lowrie, Daniel MitwirkendeR ctb Memos, Zachary MitwirkendeR ctb ACI Learning, MitwirkendeR ctb Packt Publishing, MitwirkendeR ctb |
spellingShingle | CyberSec first responder (CFR-310) Computer security Study guides Examinations Computer networks Study guides Examinations Security measures Sécurité informatique ; Examens ; Guides de l'étudiant Réseaux d'ordinateurs ; Examens ; Sécurité ; Mesures ; Guides de l'étudiant Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
title | CyberSec first responder (CFR-310) |
title_auth | CyberSec first responder (CFR-310) |
title_exact_search | CyberSec first responder (CFR-310) |
title_full | CyberSec first responder (CFR-310) |
title_fullStr | CyberSec first responder (CFR-310) |
title_full_unstemmed | CyberSec first responder (CFR-310) |
title_short | CyberSec first responder (CFR-310) |
title_sort | cybersec first responder cfr 310 |
topic | Computer security Study guides Examinations Computer networks Study guides Examinations Security measures Sécurité informatique ; Examens ; Guides de l'étudiant Réseaux d'ordinateurs ; Examens ; Sécurité ; Mesures ; Guides de l'étudiant Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
topic_facet | Computer security Study guides Examinations Computer networks Study guides Examinations Security measures Sécurité informatique ; Examens ; Guides de l'étudiant Réseaux d'ordinateurs ; Examens ; Sécurité ; Mesures ; Guides de l'étudiant Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
work_keys_str_mv | AT lowriedaniel cybersecfirstrespondercfr310 AT memoszachary cybersecfirstrespondercfr310 AT acilearning cybersecfirstrespondercfr310 AT packtpublishing cybersecfirstrespondercfr310 |