Hack Attacks Testing: How to Conduct Your Own Security Audit

Course

Online

Price on request

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

Hack Attacks Testing explains how to perform your own security audits. Step by step, the book covers how-to drilldowns for installing and configuring your Tiger Box operating systems, installations, and configurations for some of the most popular auditing software suites.               

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • IT
  • IT Security
  • Security
  • Testing
  • Network Training
  • Network
  • IT Auditing
  • Systems
  • Auditing
  • Operating Systems
  • Mac-OS
  • Mac
  • Installation
  • Mac OS
  • Audit

Course programme

Description
Hack Attacks Testing explains how to perform your own security audits. Step by step, the book covers how-to drilldowns for installing and configuring your Tiger Box operating systems, installations, and configurations for some of the most popular auditing software suites.

Program

A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets in. Written by veteran author and security expert John Chirillo, Hack Attacks Testing explains how to perform your own security audits ( Here are the contents of this book ).


Step by step, the book covers how-to drilldowns for installing and configuring your Tiger Box operating systems (Mac OS X Tiger), installations, and configurations for some of the most popular auditing software suites. In addition, it includes both common and custom usages, scanning methods, and reporting routines of each. Finally, Chirillo inspects the individual vulnerability scanner results and compares them in an evaluation matrix against a select group of intentional security holes on a target network. Chirillo tackles such topics as:


  • Building a multisystem Tiger Box
  • Basic Windows 2000 Server installation and configuration for auditing
  • Basic Linux and Solaris installation and configuration
  • Basic Mac OS X installation and configuration for auditing
  • ISS, CyberCop, Nessus, SAINT, and STAT scanners
  • Using security analysis tools for Mac OS X
  • Vulnerability assessment
Bonus CD!


The CD contains virtual simulations of scanners, ISS Internet Scanner evaluation version, and more.

Author: John Chirillo
Publisher: John Wiley
Format: Soft Cover
ISBN 10: 0471229466
ISBN 13: 9780471229469
Pages: 560
Published Date: March 2003
Availability: Ex Stock

Order today for immediate despatch!

Hack Attacks Testing: How to Conduct Your Own Security Audit

Price on request