About the Program:
Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies the most effective methods when dealing with hacking attacks, especially in an age of increased reliance on the Web.
Crafted by subject matter experts with numerous real-world examples, the Second Edition provides readers with a clear, comprehensive introduction to the many threats in our Internet environment and security and what can be done to combat them.
Course Learning Outcomes:
- Learn about the concept of social engineering and what it means in the context of cybersecurity.
- Get the latest information on cryptography and encryption in network protocols.
- Updated references to Windows 8, Server 2008, and Server 2012.
- Includes new material on using social networks, Wardriving and Warflying, detecting rogue access points, and Wi-Fi Pineapple.
- New section material on cloud computing and cloud security issues.