The Hack Is Back
Home > Computing and Information Technology > Computer security > Computer fraud and hacking > The Hack Is Back: Techniques to Beat Hackers at Their Own Games
The Hack Is Back: Techniques to Beat Hackers at Their Own Games

The Hack Is Back: Techniques to Beat Hackers at Their Own Games


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

Have you wondered how hackers and nation-states gain access to confidential information on some of the most protected systems and networks in the world? Where did they learn these techniques and how do they refine them to achieve their objectives? How do I get started in a career in cyber and get hired? We will discuss and provide examples of some of the nefarious techniques used by hackers and cover how attackers apply these methods in a practical manner. The Hack Is Back is tailored for both beginners and aspiring cybersecurity professionals to learn these techniques to evaluate and find risks in computer systems and within networks. This book will benefit the offensive-minded hacker (red-teamers) as well as those who focus on defense (blue-teamers). This book provides real-world examples, hands-on exercises, and insider insights into the world of hacking, including: Hacking our own systems to learn security tools Evaluating web applications for weaknesses Identifying vulnerabilities and earning CVEs Escalating privileges on Linux, Windows, and within an Active Directory environment Deception by routing across the TOR network How to set up a realistic hacking lab Show how to find indicators of compromise Getting hired in cyber! This book will give readers the tools they need to become effective hackers while also providing information on how to detect hackers by examining system behavior and artifacts. By following the detailed and practical steps within these chapters, readers can gain invaluable experience that will make them better attackers and defenders. The authors, who have worked in the field, competed with and coached cyber teams, acted as mentors, have a number of certifications, and have tremendous passions for the field of cyber, will demonstrate various offensive and defensive techniques throughout the book.

Table of Contents:
1. Hacking and Securing Your Operating System, 2. Update and Change Defaults, or Else!, 3. Web Application Hacking and Defense, 4. Obfuscation, Deception, and Detection, 5. Vulnerability Identification, 6. Exploitation and Reverse Shells, 7. Privilege Escalation and Persistence, 8. Data Exfiltration Leakage (Pwned), 9. Am I Hacked? How Do I Tell?, 10. A Career in Cyber

About the Author :
Jesse Varsalone is an Associate Professor of Cybersecurity Technology and the coach for the Cyber Team at University of Maryland University Global Campus. Jesse has been teaching Cyber Security related courses for 24 years, and has been teaching for a total of 30 years, Jesse has taught at undergraduate and graduate level at a number of colleges and universities including University of Maryland Global Campus, the Community College of Baltimore County, the Computer Career Institute at Johns Hopkins, UMBC Training Center, Champlain College, and Stevenson University. He also taught as a DoD contractor for 5 years at the Defense Cyber Investigations Training Academy (DCITA) where he taught courses as a Forensics and Intrusions in a Windows Environment, Network Exploitation Techniques, and Live Network Investigations. Jesse holds several certifications in the IT field, including A+, CISSP, CEH, Cloud+, CYSA+, Linux+, Net+, Pentest+, Security+, and Server+. Jesse has spoken at several conferences including many of the DoD Cyber Crime Conferences. He was a member of the Red Team for several years on the Mid-Atlantic College Cyber Defense Competition. He has a master's degree from the University of South Florida (Tampa, FL), and a bachelor’s from George Mason University (Fairfax VA). Jesse has written and contributed to several publications, including Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It by. Jesse also wrote the entire series of labs for Security+, Ethical Hacking, Forensics, and Network Security for NDG's netlab. Jesse lives with his sons Mason and Levi, and daughter Kayla in Ellicott City Maryland in Howard County Maryland. Christopher Haller is an accomplished cybersecurity expert with over 13 years of experience in Information Technology. Chris’s background includes work with the US Navy’s Cyber Defense Operations Command, Cyber Threat Intelligence, and Penetration Testing. His work has resulted in over a dozen CVEs, as well as mentorship and development of junior hackers. Chris is also the Red vs Blue Coach for the US Cyber Team, a machine creator for HackTheBox, and analysis online. Chris is certified as GIAC Security Expert #329, and also holds the CISSP, GXPN, GCPN, GPEN, GCIH, GWAPT, GICSP, GNFA, CASP+, Net+, Sec+, and more.


Best Sellers


Product Details
  • ISBN-13: 9781040098271
  • Publisher: Taylor & Francis Ltd
  • Binding: Digital (delivered electronically)
  • Sub Title: Techniques to Beat Hackers at Their Own Games
  • ISBN-10: 1040098274
  • Publisher Date: 15 Aug 2024
  • Language: English


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
The Hack Is Back: Techniques to Beat Hackers at Their Own Games
Taylor & Francis Ltd -
The Hack Is Back: Techniques to Beat Hackers at Their Own Games
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

The Hack Is Back: Techniques to Beat Hackers at Their Own Games

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!