Additional information
Weight | 0.5 kg |
---|---|
Dimensions | 11 × 11 × 11 cm |
Shipping Time | 4-9 Days |
Original price was: ₹799.00.₹639.00Current price is: ₹639.00.
Key Features
● Learn how to defend industrial control systems from an attacking standpoint.
● Learn about industrial network protocols and threat hunting.
● Handling of tackle industrial cyber risks
● Develop offensive and defensive skills.Description
In recent years, the industrial cybersecurity arena has risen dramatically. Red teams must be used to continually test and exploit the security integrity of a company’s people, processes, and products in order to completely safeguard critical infrastructure. This pen testing book takes a different approach than most by assisting you in gaining hands-on experience with equipment you’ll encounter in the field. This will allow you to comprehend how industrial equipment interacts and functions in a real-world setting.What you will learn
● Set up an ICS lab with both physical and virtual equipment using a beginning kit.
● Perform pre-engagement open-source intel collection to aid in the mapping of your attack landscape.
● Learn how to do penetration testing on industrial equipment using Standard Operating Procedures (SOPs).
● Recognize the necessity of listening to customer networks and the concepts of traffic stretching.
● Learn the fundamentals of ICS communication.Who this book is for
This book is intended for an ethical hacker, penetration tester, automation engineer, or IT security expert who wants to keep industrial networks safe from intruders. You’ll get the most out of this book if you have a basic grasp of cybersecurity and recent cyber incidents.Table of Contents
1. Using Virtualization
2. Route the Hardware
3. I Love My Bits: Lab Setup
4. Open-Source Ninja
5. Span Me If You Can
6. Packet Deep Dive
7. Scanning 101
8. Protocols 202
9. Ninja 308
10. I Can Do It 420
11. Whoot… I Have To Go DeepKey Features
● Learn how to defend industrial control systems from an attacking standpoint.
● Learn about industrial network protocols and threat hunting.
● Handling of tackle industrial cyber risks
● Develop offensive and defensive skills.Description
In recent years, the industrial cybersecurity arena has risen dramatically. Red teams must be used to continually test and exploit the security integrity of a company’s people, processes, and products in order to completely safeguard critical infrastructure. This pen testing book takes a different approach than most by assisting you in gaining hands-on experience with equipment you’ll encounter in the field. This will allow you to comprehend how industrial equipment interacts and functions in a real-world setting.What you will learn
● Set up an ICS lab with both physical and virtual equipment using a beginning kit.
● Perform pre-engagement open-source intel collection to aid in the mapping of your attack landscape.
● Learn how to do penetration testing on industrial equipment using Standard Operating Procedures (SOPs).
● Recognize the necessity of listening to customer networks and the concepts of traffic stretching.
● Learn the fundamentals of ICS communication.Who this book is for
This book is intended for an ethical hacker, penetration tester, automation engineer, or IT security expert who wants to keep industrial networks safe from intruders. You’ll get the most out of this book if you have a basic grasp of cybersecurity and recent cyber incidents.Table of Contents
1. Using Virtualization
2. Route the Hardware
3. I Love My Bits: Lab Setup
4. Open-Source Ninja
5. Span Me If You Can
6. Packet Deep Dive
7. Scanning 101
8. Protocols 202
9. Ninja 308
10. I Can Do It 420
11. Whoot… I Have To Go DeepKey Features
● Learn how to defend industrial control systems from an attacking standpoint.
● Learn about industrial network protocols and threat hunting.
● Handling of tackle industrial cyber risks
● Develop offensive and defensive skills.Description
In recent years, the industrial cybersecurity arena has risen dramatically. Red teams must be used to continually test and exploit the security integrity of a company’s people, processes, and products in order to completely safeguard critical infrastructure. This pen testing book takes a different approach than most by assisting you in gaining hands-on experience with equipment you’ll encounter in the field. This will allow you to comprehend how industrial equipment interacts and functions in a real-world setting.What you will learn
● Set up an ICS lab with both physical and virtual equipment using a beginning kit.
● Perform pre-engagement open-source intel collection to aid in the mapping of your attack landscape.
● Learn how to do penetration testing on industrial equipment using Standard Operating Procedures (SOPs).
● Recognize the necessity of listening to customer networks and the concepts of traffic stretching.
● Learn the fundamentals of ICS communication.Who this book is for
This book is intended for an ethical hacker, penetration tester, automation engineer, or IT security expert who wants to keep industrial networks safe from intruders. You’ll get the most out of this book if you have a basic grasp of cybersecurity and recent cyber incidents.Table of Contents
1. Using Virtualization
2. Route the Hardware
3. I Love My Bits: Lab Setup
4. Open-Source Ninja
5. Span Me If You Can
6. Packet Deep Dive
7. Scanning 101
8. Protocols 202
9. Ninja 308
10. I Can Do It 420
11. Whoot… I Have To Go Deep
Weight | 0.5 kg |
---|---|
Dimensions | 11 × 11 × 11 cm |
Shipping Time | 4-9 Days |
Only logged in customers who have purchased this product may leave a review.
Reviews
There are no reviews yet.