Page Tools:

Ethical Hacking and Systems Defense
National CyberWatch Center Edition

Author(s): Sean-Philip Oriyano
  • ISBN-13: 9781284239652
  • Vitalbook (vitalsource)    500 pages      © 2016
Price: $79.95 US List

Available as a VitalSource eBook only. Please click here to purchase.

Ethical Hacking and System Defense begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, the Second Edition provides readers with a clear, comprehensive introduction to the many threats on our Internet environment and security and what can be done to combat them.


Features & Benefits

KEY FEATURES OF Ethical Hacking and System Defense:

  • Includes chapter on social engineering and what it means in the context of cybersecurity, including a typical attack, identity theft, and best security practices
  • Provides new information on cryptography and encryption in network protocols
  • Includes current information on the use of social networks, Wardriving and Warflying, detecting rogue access points and WiFi Pineapple
  • Provides current data on cloud computing and cloud security issues
Chapter  1: Hacking: The Next Generation  
Chapter  2: Physical Security  
Chapter  3: Footprinting Tools and Techniques  
Chapter  4: Port Scanning  
Chapter  5: Enumeration and Computer System Hacking  
Chapter  6: Wireless Vulnerabilities  
Chapter  7: Web and Database Attacks  
Chapter  8: Malware  
Chapter  9: Sniffers, Session Hijacking, and Denial of Service Attacks  
Chapter  10: Social Engineering  
Chapter  11: Incident Response  
Chapter  12: Defensive Technologies  
Chapter  13: Exploitation Methods  
Chapter  14: After the Exploitation  

Sean-Philip Oriyano

Sean-Philip Oriyano has been actively working in the IT field since 1990. Throughout his career, he has held positions such as support specialist to consultants and senior instructor. Currently he is an IT instructor who specializes in infrastructure and security topics for various public and private entities. Sean has instructed for the US Air Force, Navy, and Army at locations both in North America and internationally. Sean is certified as a CISSP, CHFI, CEH, CEI, CNDA, SCNP, SCPI, MCT, MCSE, and MCITP, and he is a member of EC-Council, ISSA, Elearning Guild, and Infragard.

Additional Titles by this Author

The following instructor resources are available to qualified instructors for download

ISBN-13: 9781284239652

Additional Resources for Instructors
Test Bank