Learn to think like a hacker to secure your own systems and data
Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information that should remain private. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong.
Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them. You will learn to secure your Wi-Fi networks, lock down your latest Windows 11 installation, understand the security implications of remote work, and much more.
You’ll find out how to:
* Stay on top of the latest security weaknesses that could affect your business’s security setup
* Use freely available testing tools to ‘penetration test’ your network’s security
* Use ongoing security checkups to continually ensure that your data is safe from hackers
Perfect for small business owners, IT and security professionals, and employees who work remotely, Hacking For Dummies is a must-have resource for anyone who wants to keep their data safe.
Cuprins
Introduction 1
Part 1: Building the Foundation for Security Testing 5
Chapter 1: Introduction to Vulnerability and Penetration Testing 7
Chapter 2: Cracking the Hacker Mindset 25
Chapter 3: Developing Your Security Testing Plan 37
Chapter 4: Hacking Methodology 49
Part 2: Putting Security Testing in Motion 59
Chapter 5: Information Gathering 61
Chapter 6: Social Engineering 69
Chapter 7: Physical Security 87
Chapter 8: Passwords 99
Part 3: Hacking Network Hosts 129
Chapter 9: Network Infrastructure Systems 131
Chapter 10: Wireless Networks 165
Chapter 11: Mobile Devices 193
Part 4: Hacking Operating Systems 205
Chapter 12: Windows 207
Chapter 13: Linux and mac OS 233
Part 5: Hacking Applications 257
Chapter 14: Communication and Messaging Systems 259
Chapter 15: Web Applications and Mobile Apps 283
Chapter 16: Databases and Storage Systems 309
Part 6: Security Testing Aftermath 321
Chapter 17: Reporting Your Results 323
Chapter 18: Plugging Your Security Holes 329
Chapter 19: Managing Security Processes 337
Part 7: The Part of Tens 345
Chapter 20: Ten Tips for Getting Security Buy-In 347
Chapter 21: Ten Reasons Hacking Is the Only Effective Way to Test 353
Chapter 22: Ten Deadly Mistakes 357
Appendix: Tools and Resources 363
Index 379
Despre autor
Kevin Beaver is an information security guru and has worked in the industry for more than three decades as a consultant, writer, and speaker. He earned his master’s degree in Management of Technology at Georgia Tech.